US20100293259A1 - Communications system providing multi-layered extensible protocol interface and related methods - Google Patents

Communications system providing multi-layered extensible protocol interface and related methods Download PDF

Info

Publication number
US20100293259A1
US20100293259A1 US12/843,915 US84391510A US2010293259A1 US 20100293259 A1 US20100293259 A1 US 20100293259A1 US 84391510 A US84391510 A US 84391510A US 2010293259 A1 US2010293259 A1 US 2010293259A1
Authority
US
United States
Prior art keywords
protocol
module
layer
data
interface device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/843,915
Inventor
David James Clarke
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Malikie Innovations Ltd
Original Assignee
TeamOn Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TeamOn Systems Inc filed Critical TeamOn Systems Inc
Priority to US12/843,915 priority Critical patent/US20100293259A1/en
Assigned to TEAMON SYSTEMS, INC. reassignment TEAMON SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CLARKE, DAVID JAMES
Publication of US20100293259A1 publication Critical patent/US20100293259A1/en
Assigned to BLACKBERRY LIMITED reassignment BLACKBERRY LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TEAMON SYSTEMS, INC.
Assigned to MALIKIE INNOVATIONS LIMITED reassignment MALIKIE INNOVATIONS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLACKBERRY LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/2871Implementation details of single intermediate entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/182Network node acting on behalf of an other network entity, e.g. proxy

Definitions

  • the present invention relates to the field of communications systems, and, more particularly, to communications systems using multiple operating protocols for data access operations and related methods.
  • the world wide web has become a popular medium to access information.
  • users simply point their web browser to a specified uniform resource location (URL) or Web address to download a Web page from the Internet.
  • the Web page will be retrieved from a Web server, downloaded onto their browser and rendered in a viewable format, to be viewed and enjoyed by the user.
  • URL uniform resource location
  • Certain application servers cooperate with the Web server to assist in serving and rendering the content.
  • Application servers are also involved in other functions such as routing requests, acting on requests, and rendering documents to be sent back to the client.
  • a second shortcoming is that there is no control over the parameters passed to a request handler. This causes a similar problem to that mentioned above. As more functionality is needed, further parameters are added to the query string in one location and forgotten in others, resulting in complex logic to validate incoming parameters.
  • a third shortcoming relates to the use of monolithic request handlers having convoluted logic.
  • Requests are lumped together into common categories and then sent to the appropriate handler.
  • the handler has to be able to handle any one of these requests.
  • the code in these handlers can grow to the extent that they become difficult to manage.
  • a fourth shortcoming is that there are often multiple ways to work around a defined scheme. Since there is no enforceable definition of a URL scheme, it is the developer's responsibility to maintain his code correctly and efficiently. In due time, the URL formats would diverge, making it difficult to understand and maintain the application.
  • Control flow through the system would quickly become very convoluted as developers, needing functionality in another handler, begin to call other handlers directly. Often times, the response from the called handler would be either returned to the caller, or modified, and passed to another handler. The data being passed into the system would be modified as it moves through the system, making it difficult to understand.
  • a further shortcoming relates to passing parameters that are not classified or typed into an HTTP request.
  • the resulting logic required to validate each parameter can be cumbersome and is subject to the interpretation of the developer writing the code. This may also lead to misunderstanding or confusion.
  • Yet another shortcoming relates to the short interval of request timeouts. Attempting to solve this problem without a single point of control would result in complex, error-prone code.
  • a communications system which may include a plurality of data storage devices each using at least one of a plurality of different operating protocols, and a plurality of mobile wireless communications devices for accessing the plurality of data storage devices and each using at least one of the plurality of different operating protocols.
  • the system may further include a protocol interface device, which may include a protocol engine module for communicating with the plurality of data storage devices using respective operating protocols.
  • the protocol interface device may further include a front-end proxy module coupled to the protocol engine.
  • the front-end proxy module may include a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol.
  • the front-end proxy module may also include at least one common core service module coupled to the proxy modules and communicating therewith at a first layer and communicating with the protocol engine at a second layer lower than the first layer.
  • the first layer may be a network layer
  • the second layer may be a data layer
  • the protocol interface device may also include a configuration file module coupled to the at least one common core service module for storing a first set of configuration files for configuring common core services at the first layer, and for storing a second set of configuration files for configuring common core services at the second layer.
  • the front-end proxy module provides an extensible architecture that can be modified to accommodate additional common core services, such as those associated with new operating protocols, at both the first and second data layers, for example.
  • the at least one common core service module may be for at least one of routing traffic between the proxy modules and the protocol engine module, accessing data from the plurality of data storage devices, and rendering data for the plurality of mobile wireless communications devices.
  • the front-end proxy module advantageously may be used with numerous types of operating protocols, yet still use common core services to route traffic, access data, and/or render data, which provides for greater efficiency and reduced complexity.
  • the at least one common core service module may include a plurality of handlers for interfacing the proxy modules with the protocol engine module.
  • the plurality of proxy modules may convert access requests from the plurality of mobile wireless communications devices to common access parameters.
  • the front-end proxy module may further include a flow controller module for receiving the common access parameters from the plurality of proxy modules and selecting desired handlers for processing thereof.
  • the at least one common core service module may also include a renderer module for cooperating with the proxy modules to format data for the plurality of mobile wireless communications devices. Further, the at least one common core service module may also include an extensible mark-up language (XML) engine module coupled to the renderer module, such as an extensible stylesheet language transformations (XSLT) engine module, for example. Additionally, the at least one common core service module may further include a memory coupled to the XML engine module for storing a plurality of templates corresponding to respective operating protocols.
  • XML extensible mark-up language
  • XSLT extensible stylesheet language transformations
  • a method aspect of the invention is for interfacing a plurality of mobile wireless communications devices with a plurality of data storage devices.
  • the mobile wireless communications devices and the data storage devices may each use at least one of a plurality of different operating protocols.
  • the method may include providing a protocol engine module for communicating with the plurality of data storage devices using respective operating protocols, and providing a front-end proxy module.
  • the front-end proxy module may include a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol, and at least one common core service module coupled to the proxy modules and communicating therewith at a first layer.
  • the at least one common core service module may also communicate with the protocol engine at a second layer lower than the first layer.
  • a protocol interface device in accordance with the invention is for interfacing a plurality of communications devices with a plurality of data storage devices, and may include a protocol engine module and a front-end proxy module, such as those described briefly above.
  • a computer-readable medium in accordance with the invention may similarly include a protocol engine module and front-end proxy.
  • FIG. 1 is a schematic block diagram of a communications system in accordance with the present invention.
  • FIG. 2 is a schematic block diagram illustrating the protocol interface device of the communications system of FIG. 1 in greater detail.
  • FIG. 3 is a schematic block diagram illustrating the extensible front-end proxy module of the protocol interface device of FIG. 2 in greater detail.
  • FIGS. 4 and 5 are schematic block diagrams illustrating an alternate embodiment of a communications system in accordance with the invention implementing an extensible proxy architecture similar to that of FIG. 3 .
  • FIG. 6 is a schematic block diagram of an alternate embodiment of the protocol interface device of FIG. 2 .
  • FIG. 7 is a schematic block diagram further illustrating the protocol engine module of the protocol interface device of FIG. 3 and interface connector modules therefor.
  • FIG. 8 is a schematic block diagram of an alternate embodiment of the protocol engine module and interface connector modules of FIG. 7 .
  • FIG. 9 is a schematic block diagram of still another alternate embodiment of the protocol interface device of FIG. 2 .
  • FIG. 10 is a schematic block diagram of yet another alternate embodiment of the protocol interface device of FIG. 2 .
  • FIG. 11 is a flow diagram illustrating operation of the protocol interface device of FIG. 2 .
  • FIG. 12 is a flow diagram illustrating operation of the front-end proxy module of FIG. 3 .
  • FIG. 13 is a flow diagram illustrating operation of the communications system of FIG. 5 .
  • FIG. 14 is a flow diagram illustrating operation of the protocol interface module of FIG. 6 .
  • FIG. 15 is a flow diagram illustrating operation of the protocol engine and interface connector modules of FIG. 7 .
  • FIG. 16 is a flow diagram illustrating operation of the protocol interface device of FIG. 9 .
  • FIG. 17 is a flow diagram illustrating operation of the protocol interface device of FIG. 10 .
  • FIG. 18 is a schematic block diagram of an exemplary mobile wireless communications device for use with the present invention.
  • a communications system 10 includes a protocol interface device 14 that provides access to a plurality of data storage devices or systems 16 , 18 , 20 .
  • the communications system 10 illustratively includes a plurality of communications devices, namely a mobile wireless communications device 11 and a communications device 12 connected to the system via a wired connection.
  • various mobile wireless communications devices may be used in accordance with the invention, such as personal data assistants (PDAs), cellular telephones, etc.
  • PDAs personal data assistants
  • An exemplary mobile wireless communications device 11 suitable for use with the present invention is described in the example provided below with reference to FIG. 18 .
  • examples of wired communications devices include personal computers, telephones, fax machines, etc. Of course, numerous wired and wireless devices may be used, although only two are shown in the exemplary embodiment for clarity of illustration.
  • the communications devices 11 , 12 typically include software clients, which are software modules or applications that operate on or in conjunction with their respective communications device to provide access to data stored at one or more of the data storage devices 16 , 18 , and 20 through the protocol interface device 14 .
  • software clients which are software modules or applications that operate on or in conjunction with their respective communications device to provide access to data stored at one or more of the data storage devices 16 , 18 , and 20 through the protocol interface device 14 .
  • Such communications devices also include further components and/or software modules, which have not been explicitly shown in FIG. 1 for clarity of illustration.
  • the mobile wireless communications device 11 its software client communicates with the protocol interface device 14 via a wireless communication network 13 , and perhaps other networks as well (e.g., a public switched telephone network (PSTN) or the Internet), as will be appreciated by those skilled in the art.
  • PSTN public switched telephone network
  • the various functions and operations of the protocol interface device 14 are preferably implemented in software operating thereon, or in conjunction therewith.
  • the protocol interface device 14 illustratively bridges the software clients of the communications devices 11 , 12 and the data storage devices 16 , 18 , 20 .
  • Communications between the protocol interface device 14 , the communications devices 11 , 12 , and the data storage devices 16 , 18 , 20 are preferably via a wide area network (WAN) such as the Internet. That is, the communications devices 11 , 12 may communicate with the protocol interface device 14 via the Internet, as noted above, and so too may the protocol interface device communicate with the data storage devices 16 , 18 , 20 .
  • WAN wide area network
  • the protocol interface device 14 may be implemented in a private network that also includes the data storage devices 16 , 18 , 20 , the communications devices 11 , 12 , or both the data storage devices and the communications devices (e.g., in a WAN). It should be noted that the present invention is in no way limited to any particular connection or communication scheme.
  • the data storage devices 16 , 18 , 20 store data to be accessed by the software clients of the communications devices 11 , 12 .
  • software clients are configurable to directly access certain types of data storage devices, they are often data system specific or protocol specific, as described briefly above. More particularly, on constrained electronic devices such as the mobile wireless communication device 11 , processor power, memory resources, and communication channel characteristics may preclude the installation and operation of software clients having the same capabilities as those commonly used on desktop and laptop computer systems, for example. In addition, while the installation of multiple software clients for accessing data storage devices associated with different protocols is feasible for desktop and laptop computer systems, providing multiple-protocol support on such constrained devices may not be possible.
  • the data storage devices 16 , 18 , 20 are accessible using different operating protocols or access schemes.
  • the protocol interface device 14 accesses the data storage devices 16 , 18 , 20 via an operating protocol supported by respective data storage devices, and provides data to the communications device 11 , 12 via a respective client-supported operating protocol.
  • the protocol conversion functionality of the protocol interface device 14 provides a unified approach to support access to multiple types of data system. As described in further detail below, the protocol interface device 14 provides an “any-to-any” bridge between different protocols or access schemes.
  • the protocol interface device 14 is illustrated in further detail in FIG. 2 .
  • the protocol interface device 14 bridges different types of communications devices with different types of data storage devices.
  • data storage devices 24 , 26 , 28 are systems/servers for storing electronic mail (e-mail).
  • e-mail electronic mail
  • Each of the mail systems 24 , 26 , 28 supports a different operating protocol or access scheme. More particularly, the mail system 24 supports Outlook Web Access (OWA), the mail system 26 supports Microsoft Messaging Application Programming Interface (MAPI), and the mail system 28 supports a proprietary protocol, such as that used by America Online (AOL), for example.
  • OWA Outlook Web Access
  • MEMI Microsoft Messaging Application Programming Interface
  • AOL America Online
  • the protocol interface system 14 illustratively includes a front-end proxy module 30 .
  • the front-end proxy module illustratively includes proxy modules 34 , 36 , 38 , 40 which respectively support the Wireless Application Protocol (WAP), the Post Office Protocol (POP), the Internet Message Access Protocol (IMAP), and the Hypertext Transfer Protocol (HTTP) for communication with clients.
  • WAP Wireless Application Protocol
  • POP Post Office Protocol
  • IMAP Internet Message Access Protocol
  • HTTP Hypertext Transfer Protocol
  • the front-end proxy 30 also communicates with a protocol engine module 32 .
  • the protocol engine module 32 translates OWA, MAPI, the proprietary protocol of the mail system 28 (and other protocols, if desired) into a format compatible with the front-end proxy module 30 .
  • a respective interface connector module may 70 - 77 ( FIG. 7 ) be coupled to the protocol engine module 32 for each of the operating protocols used by the mail systems 24 , 26 , 28 , as will be discussed further below.
  • the front-end proxy module 30 and the protocol engine module 32 are extensible or expandable to accommodate additional operating protocols as they become available, as will also be discussed further below.
  • a user accesses a mailbox on one of the mail systems 24 , 26 , 28 through client software on his communications device.
  • client software on his communications device.
  • a WAP browser on a mobile wireless communication device communicates with the WAP proxy module 34 to access the mail system 24 .
  • Access commands or instructions received by the WAP proxy 34 are converted into a format compatible with the protocol engine module 32 .
  • Communications between the front-end proxy module 30 and the protocol engine module 32 are preferably achieved via a common interface protocol, which may be a proprietary protocol or an established public protocol.
  • the protocol engine module 32 then translates the access commands or instructions received from the front-end proxy module 30 into a protocol associated with the mail system to be accessed (e.g., OWA for the mail system 24 ).
  • a protocol associated with the mail system to be accessed e.g., OWA for the mail system 24 .
  • Data received from the mail system e.g., e-mail messages, a list of new messages, calendar appointments, tasks, etc., depending on the particular mail system
  • the features that its access protocol supports, and the nature of the access command are translated into the common interface protocol and transferred to the front-end proxy.
  • the active proxy module (i.e., the WAP proxy module 34 in the present example) then formats the received data, or at least portions thereof, for the requesting client. Further commands from the client are also translated by the protocol interface device 14 . Access commands from other types of clients are similarly processed. It should be noted that several mail systems may be accessed in response to a single access command, where a user has enabled multiple mailbox access through the protocol interface device 14 .
  • the protocol interface device 14 thus allows clients using different operating protocols to access the mail systems 24 , 26 , 28 , which also use different operating protocols. Access commands such as move, delete, create, send, fetch, and view, for example, that are generated at a client affect the data stored at the mail systems 24 , 26 , 28 instead of copies of the data.
  • a client compatible with any one of the proxy modules 34 , 36 , 38 , 40 is provided access to one or more of the mail systems 24 , 26 , 28 .
  • the client itself advantageously need not support the access protocol or scheme associated with the mail system(s) to be accessed.
  • the interface protocol used between the protocol engine module 32 and the front-end proxy module 30 is preferably designed to be able to represent a desired number of protocol-supported elements or features for a desired operating protocol. More specifically, the common interface protocol is preferably able to represent all protocol-supported elements for the most “capable” protocol (OWA in the present example), to provide the broadest possible feature support. Further still, the common interface protocol may support a full feature set across all supported protocols, if desired.
  • the common interface protocol may be a proprietary protocol based on the Web-based Distributed Authoring and Versioning (WebDAV) protocol.
  • WebDAV Web-based Distributed Authoring and Versioning
  • An example of an authentication request using such a common interface protocol is provided as program listing #1, below.
  • This exemplary authentication request routine allows the protocol interface device 14 to be authenticated by a mail system using a user identifier and password provided by a user, and it also retrieves a root folder and basic capabilities of a target mailbox on the mail system.
  • program listing #2 An exemplary inbox request in accordance with a WebDAV-based common interface protocol is set forth below as program listing #2.
  • program listing #3 Another example is provided below as program listing #3, which is for a folder search request in accordance with the aforementioned WebDAV-based common interface protocol.
  • a list of subfolders for a given folder is returned in response to this request.
  • the protocol interface device 14 may include (or communicate with) a polling or aggregation engine module (not shown) that prompts the protocol engine module 32 to aggregate messages for respective users from the mail systems 24 , 26 , 28 at predetermined intervals, as will be appreciated by those skilled in the art.
  • the protocol engine module 14 would then cooperate with the front-end proxy module 30 to provide the aggregated messages to the respective software clients, as described above.
  • the front-end proxy module 30 need not communicate directly with the communications devices 11 , 12 in all embodiments, but it may instead communicate therewith via an intervening mail system or server, for example.
  • the aggregated messages may be first transferred by the front-end proxy module 30 to an intervening mail server, which in turn provides the messages to the appropriate communications device, as will also be appreciated by those skilled in the art.
  • the front-end proxy module 30 would use the appropriate protocol(s) supported by such intervening mail server for communicating therewith.
  • FIG. 11 A method for providing access to a plurality of data storage devices, such as the mail systems 24 , 26 , 28 , using the protocol interface system 14 is illustrated in FIG. 11 .
  • an access command or data is first received, at Block 111 .
  • the access command or data is translated into the common interface protocol, at Block 112 .
  • An access command is then translated (Block 113 ) into a data system protocol associated with the data system to be accessed, such as OWA for the mail system 24 , for example.
  • data is translated into the client protocol, at Block 113 .
  • the protocol interface device 14 may generate an error responsive to a non-supported operating protocol. More particularly, non-supported interface protocol elements are preferably ignored or processed according to a default or error-processing scheme.
  • Translated access commands or data are then transferred to a data system or a client, at Block 114 , thus concluding the illustrated method (Block 115 ).
  • the front-end proxy module 30 illustratively includes the proxy modules 34 , 36 , 38 , 40 , a renderer module 44 , an extensible stylesheet language transformations (XSLT) engine module 46 , a memory or template store 48 , a flow controller module 50 , and handlers 52 a - 52 n.
  • XSLT extensible stylesheet language transformations
  • each proxy module 34 , 36 , 38 , 40 effectively “fronts” the protocol engine module 32 and translates respective operating protocols for different client types.
  • a WAP proxy module provides information retrieved from one or more of the handlers 52 a - 52 n in the form of WML documents targeted for display on devices such as cell phones and PDAs.
  • a POP proxy makes use of at least some of the same proxy components, including the flow controller module 50 and the renderer module 44 to render data in the form required by the POP protocol.
  • each proxy module 34 , 36 , 38 , 40 makes use of the same core services to route traffic, access data, and render data.
  • the renderer module 44 , XSLT engine module 46 , template memory 48 , flow controller module 50 , and handlers 52 a - 52 n provide a common core service module for the proxy modules 34 , 36 , 38 , 40 .
  • the only differences between translations by the different proxy modules 34 , 36 , 38 , 40 would be in the configuration of the flow controller 50 , the handlers 52 a - 52 n, and the XSL templates used to translate the data into its final form. It many cases, the same handlers 52 a - 52 n will be re-used between by the various proxy modules 34 , 36 , 38 , 40 , as will be appreciated by those skilled in the art.
  • a data access request from a client is passed to the appropriate proxy module 34 , 36 , 38 , 40 using standard mechanisms for the client protocol.
  • parameters are passed via a query string and/or form variables.
  • the WAP proxy module 34 determines a component identifier (which identifies a target item such as a mail folder), an action identifier (which identifies an action to be performed), and any parameters based on data in the request.
  • the component and action identifiers are passed in the query string or form.
  • Other parameters in the query string or form are packaged into a parameter list.
  • the active proxy module then calls the flow controller 50 , passing along the identifiers and parameter list.
  • the flow controller looks up the appropriate handler via the component and action identifiers and constructs the handler, passing the parameters as arguments to a constructor (not shown).
  • this handler would processes the request, using a data layer ( FIG. 5 ) to gather information needed for a response.
  • the data layer communicates with the protocol engine module 32 for any information related to the contents of the user's mailbox, calendar, or address book, for example. Communications with other components may be established for different types of information, such as information related to authentication services and a user's e-mail account.
  • the handler 52 a decides whether the request should be forwarded to another handler, or if its results should be rendered.
  • All information passed back by the handlers 52 a - 52 n is preferably in a common format, such as org.xml.sax.InputSource, for example, a provider of extensible mark-up language (XML) data.
  • the active proxy module then calls the renderer module 44 , passing along the InputSource, locale information, the name of the template to be rendered, and an OutputStream.
  • the renderer module 44 making use of the XSLT engine 46 , renders the page into the OutputStream.
  • the OutputStream is then provided to the client by the active proxy module using the client protocol.
  • the above system provides a generic application framework following the classic model/view/controller (MVC) architecture that implements most of the application infrastructure.
  • MVC model/view/controller
  • One important feature is that a base set of functionality may be defined for similar services and then extended to provide the service-specific functionality required to fully implement a given service.
  • the flow controller 50 , the handlers 52 a - 52 n, and/or the data access layer are fully extensible or replaceable.
  • supporting a brand new service simply involves defining and implementing the data layer, defining the control flow and discrete actions within the system (i.e., the flow controller module 50 ), and defining and implementing the interface with the service (i.e., the renderer module 44 ).
  • supporting a new type of client with an existing service involves making minor changes to, and extending actions within, the flow controller module 50 and handlers 52 a - 52 n to support additional client-required functionality, and defining and implementing the interface between the client and the system (i.e., the renderer module 44 ).
  • Operation of the front-end proxy module 30 to perform protocol translation is further described with respect to the block diagram of FIG. 12 . Certain of the illustrated operations have been described in detail above, and thus will be described only briefly below to avoid undue repetition.
  • an access request or command is received at a proxy module 34 , 36 , 38 , 40 , at Block 121 .
  • the access request is translated into the common interface protocol by one or more of the handlers 52 a - 52 n, at Block 122 .
  • Data is received from a given mail system 24 , 26 , 28 in response to the request, at Block 123 .
  • This data which has already been translated into the common interface protocol by the protocol engine module 32 , is rendered (Block 124 ) and returned to the client, at Block 125 , thus concluding the illustrated method (Block 126 ).
  • Block 124 the data, which has already been translated into the common interface protocol by the protocol engine module 32 , is rendered (Block 124 ) and returned to the client, at Block 125 , thus concluding the illustrated method (Block 126 ).
  • Non-supported interface protocol elements may be ignored or processed according to a default or error processing scheme, as noted above.
  • the extensible, common core service architecture of the front-end proxy module 30 may also be used for a variety of applications.
  • One such application is to address various shortcomings of the disparate methods used to respond to HTTP requests from a Web application.
  • FIGS. 4 and 5 a Web data access system 100 having an extensible architecture in accordance with the present invention is now described.
  • the components of the Web data access system 100 communicate bi-directionally, and they illustratively include a user request 101 , a Web server 102 , a proxy server 104 , and an extensible controller system 106 .
  • the user request 101 refers to a user using a web browser or web application to request a web page (e.g., from a PDA or personal computer).
  • the Web server 102 processes the request.
  • the proxy server 104 assists the Web server 102 in processing the request.
  • the proxy server 104 here functions similar to the protocol interface device 14 discussed above, and the extensible controller system 106 would be implemented as a software module that is run on or in conjunction with the proxy server, as will be appreciated by those skilled in the art.
  • the proxy server 104 and extensible controller system 106 could be implemented in different physical devices or servers, for example.
  • the proxy server 104 provides a process of providing cached or storage items available on other servers which are slower or more resource intensive to access.
  • the proxy server 104 accepts URLs with a special prefix. When it receives a request for such a URL, it strips off the prefix and looks for the resulting URL in its local cache. If found, it returns the document immediately, otherwise it fetches it from the remote server, saves a copy in the cache, and returns it to the requester.
  • the pages returned by the proxy server 104 can be either static or dynamic in nature.
  • the proxy server 104 may communicate with application servers or data servers, and in this specific embodiment, the extensible controller system 106 .
  • the components of the proxy server 104 illustratively include an aggregate server 202 , a renderer module 212 , an XSLT engine module 214 , and a memory 216 for storing a series of templates, similar to those described above.
  • the components of the extensible controller system 106 include an action map 204 , and a series of handlers 206 , also similar to those discussed above.
  • the aggregate server 202 performs the processing of incoming information and passes it onto other components for assistance.
  • the renderer module 212 renders the resultant data into a viewable format.
  • the renderer module 212 makes use of the XSLT engine module 214 and any necessary templates from the memory 216 to render the page.
  • the aggregate server 202 sends data to the action map 204 , which maintains the control flow and handles the business logic in the system.
  • the action map 204 interacts with a series of handlers 206 .
  • the handler 206 utilizes the data layer 208 to retrieve information from other data sources 210 .
  • the other data sources 210 may include, for example, XML for web data, a universal proxy for any information related to the contents of user applications (e.g., e-mail, calendar or contact), or a provisioning API for authentication services and data relating to a user account.
  • the system functions by having a user send in a URL as a user request 101 .
  • This request is received at the Web server 102 , which passes on to the proxy server 104 for processing using standard mechanisms for the protocol.
  • a WML request would pass a WAP parameter query string and/or form variables.
  • the aggregate server 202 component of the proxy server 104 determines the component ID, action ID and any parameters based on data in the request. Using the same WAP example, the component and action IDs are passed in the query string or form. All other parameters in the query string or form are packaged up into a parameter list.
  • the aggregate server 202 then calls the action map 204 of the extensible controller system 106 and passes along the IDs and parameter list.
  • the action map 204 looks up the appropriate handler 206 via the component and action IDs and constructs the handler, passing the parameters as arguments to the constructor.
  • the handler 206 processes the request, using the data layer 208 to gather information needed for a response.
  • the data layer 208 will retrieve information from other data sources 210 located within the network or external to the network.
  • the handler 206 then decides whether the request should be forwarded to another handler 206 , or if its results should be rendered.
  • the data is passed from the handler 206 , back to the action map 204 , and back to aggregate server 202 of the proxy server 104 .
  • the aggregate server 202 then calls the renderer module 212 , which invokes the XSLT engine module 214 and any necessary templates to render the data into a viewable output. This output is then returned to the Web server 102 to serve the data as a viewable web page as a result of the user request 101 .
  • FIG. 13 illustrates in greater detail the processing and interaction of the proxy server 104 and the extensible controller system 106 .
  • the system flow begins with a user request 101 .
  • This request is sent to the Web server 102 , which passes the information to the proxy server 104 for processing.
  • the proxy server 104 invokes the aggregate server 202 for processing.
  • the aggregate server 202 determines whether a context is available, at Block 302 . If it is available, the system will move to the next step to mine the IDs (Block 306 ). If it is not available, the system will first create the context, at Block 304 , and then continue onto the step to mine the IDs, at Block 306 . The action ID and component ID are also mined out of the system. These IDs, along with the request parameters and any form data, are packaged into an envelope and gathered together, at Block 308 .
  • An invoke procedure is called to pass the data from the aggregate server 202 to the action map 204 of the extensible controller system 106 .
  • This invoke procedure will pass information pertaining to the envelope, an action code, the component ID and context info to the action map 204 .
  • the action map 204 looks up the action, at Block 310 , and determines whether the action exists, at Block 312 . If it does, then it moves to the next step to determine whether the action requires authentication, at Block 316 . If the action does not exist, the system retrieves the default action, at Block 314 , and then determines whether the action requires authentication, at Block 316 .
  • the system determines if any requests are pending, at Block 320 . If the action does require authentication, the system then determines whether the context is in an authenticated state, at Block 318 . If the context is in an authenticated state, the system then determines whether a request is pending, at Block 320 . However, if the context is not in an authenticated state, the system returns the request to the retrieve default action, at Block 314 , until authentication is accepted.
  • the system determines if a request is pending. If a request is pending, the system executes on the pending request and jumps to next stage, determining whether a process is in queue, at Block 346 . If no request is pending, the system executes on the action and validates on the envelope data, at Block 322 , and passes control to the handler 206 to create the action handler, at Block 324 . Once the action handler is created, it is initialized, at Block 326 .
  • the system determines whether background processing is allowed, at Block 328 . If so, a background handler is created, at Block 344 , and the system determines whether a process is in queue, at Block 346 . However, if background processing is not allowed, the system then processes the action handler, at Block 330 , and then returns the result, at Block 332 . Revisiting the system, at Block 346 the system determines whether a process is in the queue. If the process is in the queue, it then determines whether the action is complete, at Block 350 . If the process is not in the queue, then it submits it to the queue, at Block 348 , and then determines whether the action handler is complete, at Block 350 .
  • the system returns the action handler result, at Block 352 . If the action handler is not complete, the system returns the pending render result, at Block 354 .
  • the output of the steps illustrated at Blocks 352 and 354 (returning either an action handler result or pending renderer result) will be used to determine whether to render the result, at Block 334 .
  • Block 334 the results of the steps illustrated at Blocks 332 (return result), 352 (return action handler result) and 354 (return pending render result) are used to determine whether to render the result (Block 334 ). If the system decides to render the result, the system sends the data from the extensible controller system 106 to the proxy server 404 and renders the data, at Block 340 , at the renderer module 212 . The data is then passed onto the Web server 102 to display the result, at Block 342 , as a response to the user request 101 .
  • the system retrieves the ID keys, at Block 336 , retrieves the envelope data, at Block 338 , and then looks up the appropriate action, at Block 310 . The system will loop around at this point until a decision to render a result is ultimately accepted, at Block 334 .
  • the above-described method involves using a single source for defining the components within the system.
  • the source is an XML file, but other formats could be used as well, as will be appreciated by those skilled in the art.
  • This source would define the code that handles the request, the URL syntax and parameters, templates or code used to generate the response for the request, and the routing information for the request, for example.
  • the code that handles the request is used by the system to create the action handler, pass the correctly typed parameters, and pass control to it for processing.
  • the parameters include type information allowing for strongly typed data.
  • the parameters may also be defined as optional or required.
  • the template or templates are used to generate the response for the request. If an attempt is made to generate a response other than to what was defined an error is generated.
  • the source would also define the routing information for the request. Often times, it is desirable for a handler to perform work within its scope and then hand off control to another handler to allow it to perform its work. However, if the handler attempts to hand control to something not defined in the source, an error is generated.
  • the source may be used whenever generating URL's for use within the system.
  • request routing may be separated from the actual processing of those requests. Control flow is then handled by one component of the system, not by each handler. The handler would then simply ask the controller to forward a request to another handler. Thus, incoming data may be kept in a known state for the life of a particular request.
  • Yet another approach involves enforcing control flow through the system where one handler does not call another handler directly to do its work. Still another approach involves keeping the handlers relatively small and simple. That is, this will limit the handler's purpose and scope to receiving requests and calling the appropriate business logic to gather the desired results. Another variation involves keeping each handler focused on one task, and upon completion of the task, allowing the results to be rendered or forwarded on to the next handler.
  • a further variation involves providing an extensible mechanism for handling requests that can handle immediate needs, as well as grow over time without becoming overly complex.
  • the user When loading the system, the user is able to specify a primary and secondary action map. In this way, generic business logic and control flow may be specified by the primary action map while still providing the user with a method of adding or modifying the functionality.
  • Another approach is to provide the developer with a generic mechanism for responding quickly to long running requests to avoid generating a timeout. This enables the developer to specify background processing at either a handler level, or at the entire system.
  • a resource manager which may be part of the front-end proxy module 30 ′ or a separate component of the protocol interface device 14 ′, advantageously allows a user to specify a primary and secondary set of configuration files. If a secondary configuration file is specified, any resources defined in it will override those specified in the primary configuration file. This allows the user to specify a core set of resources and then tweak them to fit a particular implementation.
  • configuration files may be stored for processing operations at different network layers.
  • configuration files for data layer operations for interfacing the front-end proxy module 30 ′ and protocol engine module 32 ′ may be stored in the memory 31 ′, as well for upper network layer operations performed by the flow controller module 50 , for example.
  • Other types of configurations files may be used as well, as will be appreciated by those skilled in the art.
  • a configuration file also preferably specifies the implementation class that is created to handle the response to a given request. This makes it a simple matter to slightly change the behavior of an object in a data model, or even completely replace it. Caching behavior and strength for each request may also be specified in a configuration file. With a combination of these two properties, a developer can have much greater control over memory consumption and response/request performance.
  • configuration files also allow a user to specify multiple requests for a given resource. This makes it possible to support data systems with different request/response formats.
  • An exemplary configuration file is provided below as program listing #4. This configuration file is suitable for a data store that supports a WebDAV interface, as discussed above, or in the case of the protocol interface device 14 ′, a protocol engine that supports a WebDAV interface. However, it could be used for other types interfaces/data stores as well.
  • a user may also specify a command to further identify a given resource. This allows the user to perform multiple different operations on a given resource type, as will be appreciated by those skilled in the art.
  • an access request or command is received at a proxy module, at Block 141 .
  • the access request is translated into the common interface protocol by a handler 52 a - 52 n, at Block 142 , with reference to one or more configuration files.
  • Data that is received from the data system (Block 143 ) in response to the request, and which has already been translated into the common interface protocol by the protocol engine module 32 ′, is formatted into a response and rendered, at Block 144 . Again, this is done with reference to one or more configuration files.
  • the rendered response is then returned to the client (Block 145 ), thus concluding the illustrated methods, at Block 146 .
  • the protocol engine module 32 provides a framework to incorporate various interface connector modules 70 - 77 that communicate with various mail systems using different protocols.
  • the protocol engine module 32 also provides a common interface XML and WebDAV, for example, that the clients, through the front-end proxy module 30 , use to access various mail accounts.
  • Common operations like retrieving only the essential headers of new mail and determining the presence and size of attachments without downloading them are highly efficient. All operations are performed directly on the source, and only the essential data is retrieved.
  • the protocol engine module 32 uses an appropriate one of a plurality of interface connector modules 70 - 77 to access a mail account. All of the connector modules 70 - 77 preferably support a common application programming interface (API), such that adapting the protocol engine module 32 to support a new protocol amounts to simply adding a new interface connector module.
  • API application programming interface
  • the connector modules 70 - 77 may be written in Java, for example, although other suitable languages or protocols may also be used. Overall system performance and availability may be improved, for example, by providing multiple dynamically load-balanced protocol engine machines.
  • Results received by the protocol engine module 32 from the mail systems 24 , 26 , 28 are similarly translated into the common interface protocol for translation into a client-supported protocol, if necessary, and transmission to a client.
  • the results communicated back to a client preferably include only data that was requested by the client.
  • Data corresponding to features that are supported by a mail system protocol but not by a client protocol may be translated into the common interface protocol, but it may also be ignored or handled according to a default or error processing scheme, as noted above.
  • a method of protocol translation using the protocol engine module 32 and interface connector modules 71 - 77 is now described with reference to FIG. 15 .
  • an access request or command is received, at Block 151 .
  • the access request is translated into a protocol supported by the target data system, at Block 152 .
  • Data is received from the data system in response to the request, at Block 153 , and it is translated into the common interface protocol, at Block 154 . Further translation of the data into a client protocol may be performed, if necessary, at Block 155 , and the data transmitted to the client at Block 156 , thus concluding the illustrated method, at Block 157 .
  • the protocol engine module 32 takes the form of a universal proxy (UP) servlet module 80 , and each interface connector module 81 , 82 , 83 and a respective provider module 84 , 85 , 86 are associated with different operating protocols.
  • the different protocols are OWA, IMAP, and POP. Further or different protocols may be supported by corresponding provider/connection pairs, as will be appreciated by those skilled in the art.
  • the UP servlet module 80 takes incoming common format requests and translates them into calls, using the defined interfaces, to the interface connector modules 81 - 83 .
  • the UP servlet module 80 also takes the results of these calls and formats them into common format requests.
  • Each common format request includes a method request and a path in the form of a URL. It may also include an XML document that provides additional parameters for the request.
  • each provider module 84 - 86 takes care of handling the calls made by the UP servlet module 80 .
  • each provider has a connection, which takes care of communicating with the source mailbox/account on a target mail system. Initially, the connection will also be the provider.
  • the interfaces used by the UP servlet 80 and implemented by the provider modules 84 - 86 define a loose folder hierarchy. In fact, it may be conceptualized as a collection of collections of items.
  • An item can be a message, a folder, or a contact, for example, or any other data item to be represented.
  • Each item has a defined type (e.g., mail, contact, appointment).
  • An interface for each type of item defines the properties and actions that are available for that type of item.
  • a folder item includes a collection of items, and provides methods to enumerate the items within a folder.
  • the connector interface modules 81 - 83 provide a common way for the UP servlet module 80 to communicate with different provider modules/interface connector modules. Some connector modules may only implement a subset of the protocol and/or may only support a single folder (collection) of items, as in the case of POP.
  • the basic flow for an exemplary common format request proceeds as follows.
  • the UP servlet module 80 receives the request, and it either retrieves or creates the appropriate provider/connection.
  • the UP servlet module 80 then calls an appropriate “get folder” or similar function associated with the interface connector module, passing a target mail system identifier, such as a URL that was included in the common format request.
  • the interface connection module returns a reference to some object that implements the folder interface and represents the requested folder. In its simplest implementation (e.g., POP), a single object could be the interface connector module and also represent the mailbox folder.
  • the UP servlet module 80 uses the returned folder reference to make additional calls to satisfy the common format request. For example, if the UP servlet module 80 needs to retrieve a specific item, it may first call a “get folder” function, passing the requested URL, and after it has the folder, it will then call a “get item” function, again passing the URL. The results of the call(s) are then formatted into an appropriate format, such as XML, and returned in an HTTP response.
  • an appropriate format such as XML
  • the provider modules 84 - 86 and interface connection modules 81 - 83 preferably support a root folder. If only a root folder is supported, then inbox, calendar, and contact items (as appropriate) should be items within that folder if they are to be accessible through a protocol engine.
  • a single, advantageous mechanism to access various types of protocols is provided.
  • This mechanism supports the full functionality of each data system protocol for similarly capable client protocols, and degrades when a specific data system protocol feature is not supported by a client protocol.
  • Requests received in a common format are translated into a provider/protocol specific format before forwarding the request on to the destination server.
  • Responses from the destination server, which are in provider/protocol specific format, are translated back into the common format.
  • a mechanism for a client to query supported functionality for a specific provider module, giving the client greater control over how it generates requests to the provider, is also provided.
  • Any client written to support the common protocol format, directly or through a proxy, can easily provide access to any mail store without concerning itself with the details of the mail store provider module/protocol.
  • protocol interface device 14 ′′ is now described.
  • user e-mail account information associated with e-mail accounts to be accessed through the protocol interface device 14 ′′ is stored in a data store 90 ′′.
  • the per-account information preferably includes an indication of the access protocols supported for each e-mail account.
  • Records in the data store 90 ′′ may be arranged by an account identifier, such as an e-mail address, or by a user name associated with the protocol interface device 14 ′′ such that all e-mail account information for particular users is grouped in the data store 90 ′′, for example.
  • the per-account information may include mail system information indicating the operating protocols supported by each mail system.
  • a data store 91 ′′ stores a list of all operating protocols supported by the protocol engine module 32 ′′, and corresponding metrics (i.e., ranking) representing protocol preferences. These metrics are calculated based on capability criteria, such as the degree to which features of each mail system 24 ′′, 26 ′′ are supported by a protocol and the security level of a protocol, for example. Other criteria may also be used and will be apparent to those skilled in the art.
  • OWA would typically have a higher metric or ranking than MAPI, and IMAP would generally be ranked higher than POP.
  • Each of the data stores 90 ′′, 91 ′′ may be implemented, for example, in a database on a local hard disk or other memory at the protocol interface device 14 ′′, or on a file server with which the protocol interface device communicates.
  • the protocol engine module 32 ′′ determines to which mailbox(es) or account(s) the command or instruction relates, and then accesses the per-account information in the data store 90 ′′ to determine whether more than one access protocol is supported for each account to be accessed. If only one access protocol is supported, then that protocol is selected. Where more than one access protocol is supported for the account, then the protocol engine module 32 ′′ accesses the data store 91 ′′ to determine which supported protocol is preferred or desired, and the supported protocol with the highest metric or ranking is selected. For the mail system 24 ′′, OWA is preferably selected over MAPI, and for the mail system 26 ′′, IMAP is preferably selected over POP.
  • the protocol interface device 14 ′′ thus allows access to the mail systems 24 ′′, 26 ′′ using a most capable supported protocol.
  • a client compatible with any of the proxy modules 34 ′′, 36 ′′, 38 ′′, 40 ′′ is provided access to one or more of the mail systems 24 ′′, 26 ′′.
  • the client itself need not support the access protocol or scheme associated with the mail system(s) to be accessed.
  • a method of data system access protocol selection using the protocol interface device 14 ′′ is now described with reference to FIG. 9 .
  • an access command is received from a client at Block 161 .
  • a determination is made (Block 162 ) as to whether each data system to be accessed in response to the command supports more than one access protocol. If so, then the most capable supported protocol is selected, at Block 164 . Otherwise, the one supported protocol is selected, at Block 163 .
  • Each data system is accessed using the selected protocol, at Block 165 , thus concluding the illustrated method, at Block 166 . Where more than one data system is to be accessed, the protocol selection steps illustrated at Blocks 162 - 164 are preferably repeated for each data system.
  • protocol and metric data store 91 ′′ is but one example exemplary of a protocol preference ranking technique that may be used in accordance with the present invention.
  • Protocol preferences may be inherent in the ordering of a list of supported protocols, for example.
  • the type of client from which the access command is received may also affect protocol selection. Where the access command is received from a POP client, for example, many of the enhanced features supported by OWA cannot be represented in POP for transfer to the device. If a user has only one type of client for accessing the protocol interface device 14 ′′, then the per-account information may be adapted to reflect the type of client or to limit the list of supported protocol based on the type of client. Otherwise, a further step in protocol selection may be to determine the type of client from which an access request is received.
  • a most capable protocol supported by a data system to be accessed may always be selected, and any incompatibility between the selected access protocol and the protocol supported by the client is handled during translation of data to the client protocol. Portions of data corresponding to elements of the interface protocol that are supported by the client protocol are translated, whereas non-supported interface protocol elements are ignored or processed according to a default or error processing scheme.
  • the present invention provides an apparatus and technique that may be used by the proxy to give the client the illusion that the collection being accessed is smaller than it really is. For example, a proxy may show only the 100 most recent messages in a mailbox, while the mailbox itself has 2000+ messages. The present invention advantageously allows this proxy to select a small subset of the collection that can be presented to the client in lieu of the entire collection without a significant impact to the user experience.
  • the protocol interface device 14 ′′′ accesses one or more of the data systems 24 ′′′, 26 ′′′.
  • accessing the data systems and providing a response to the client might otherwise cause timeouts for certain client protocols, and longer than desired wait times for a user of a client after a request has been sent.
  • certain data may be stored at the protocol interface device 14 ′′′ which may be used to reduce response times.
  • the protocol engine module 32 ′′′ polls the data systems 24 ′′′, 26 ′′′ to determine whether they currently store data items associated with users that have been configured for access thereof. Users are configured in the protocol interface device 14 ′′′ by establishing a user account associated therewith, for example. Polling is preferably performed in accordance with a polling interval.
  • the polling interface may be a static predetermined polling interval, or an adaptive polling interval that can be adjusted based on operating conditions or the occurrence of particular events, as will be appreciated by those skilled in the art.
  • a given data system 24 ′′′, 26 ′′′ In response to a poll from the protocol engine module 32 ′′′, a given data system 24 ′′′, 26 ′′′ returns data items, or at least data item identifiers that can be used to retrieve the data items, to the protocol interface device 14 ′′′, These data items or identifiers are then stored by the protocol engine module 32 ′′′ in the data store or memory 92 ′′′.
  • the protocol engine module 32 ′′′ may determine whether new data items for a user are stored in any of the data systems 24 ′′′, 26 ′′′, Where the data systems 24 ′′′, 26 ′′′ are e-mail systems, for example, the protocol engine module 32 ′′′ queries mailboxes associated with each user configured for e-mail access through the protocol interface device 14 ′′′, For each mailbox query, a mail system returns, at a minimum, a list of unique identifiers (UIDs) associated with e-mail messages stored in the mailbox.
  • UIDs unique identifiers
  • a current UID list is then compared with a previous UID list for the mailbox in the UID store 92 ′′′ to determine whether new messages have been stored in the mailbox at the mail system. If new messages are detected, an alert is preferably sent to a user's client by the protocol engine module 32 ′′′ in cooperation with the front-end proxy module 30 ′′′ (or another component of the protocol interface device 14 ′′′), and the current UID list including the new messages is stored to the UID store 92 ′′′.
  • the protocol engine module 32 ′′′ polls one or more of the data systems 24 ′′′, 26 ′′′ to detect new data items based on a list of UIDs stored in the UID store 92 ′′′, Therefore, the protocol interface device 14 ′′′ has a local listing of UIDs of data items that were stored at the data systems 24 ′′′, 26 ′′′ the last time the data systems were polled.
  • the protocol engine module 32 ′′′ retrieves the stored UID list from the UID store 92 ′′′ when a “view items” or similar access request is received. This stored UID list, which is accurate to within the current polling interval, is then returned to the requesting client. This provides a much faster response time than accessing the data systems 24 ′′′, 26 ′′′ when the request is received, as will be appreciated by those skilled in the art.
  • the client times out if no response to a request is received within 30 seconds.
  • latency within the wireless communications network can cause delays that are significant relative to this limited response time.
  • the faster response time associated with providing a stored UID list in response to a data access request is particularly advantageous in these types of scenarios. Even in the absence of such time constraints, a faster response time enhances the user experience at a client by reducing the wait time between sending a data access request and receiving a response.
  • the stored UID list is accurate to within the polling interval.
  • the protocol engine module 32 ′′′ preferably polls the data system(s) 24 ′′′, 26 ′′′ to determine whether the stored UID list is still accurate. If new items have been stored at the data system(s) 24 ′′′, 26 ′′′ since the last poll, then a new UID list is sent to the client. This further polling of the data systems 24 ′′′, 26 ′′′ is performed either according to the polling interval or initiated by the data access request.
  • the protocol interface device 14 ′′′ thereby allows access to the data systems 24 ′′′, 26 ′′′, and provides for reduced response times for various types of data access requests.
  • a client compatible with any of the protocols handled by the front-end proxy module 30 ′′′ is provided access to one or more of the data systems 24 ′′′, 26 ′′′.
  • the client itself need not support the access protocol or scheme associated with the data system(s) 24 ′′′, 26 ′′′ to be accessed, as noted above.
  • a data access request is received at Block 171 .
  • a determination is then made, at Block 172 , as to whether data pertinent to the data access request (i.e., a UID list) is locally stored. Where such data is in a local store 92 ′′′, then the stored data is provided to the requesting client, at Block 173 .
  • the data system(s) 24 ′′′, 26 ′′′ to which the data access request relates is polled, at Block 174 .
  • An optional step of determining whether the polled data received in response to a poll is different from the stored data may then be performed at Block 175 . If so, this means that there is new data stored on the data system(s) 24 ′′′, 26 ′′′, and the data received in response to the poll is provided to the client, at Block 176 . It is also locally stored in the data store 92 ′′′, at Block 177 , thus concluding the illustrated method (Block 178 ).
  • data access systems and methods according to aspects of the invention may be applied to other types of data storage devices than mail systems, and other protocols and access schemes than those specifically described above and shown in the drawings.
  • the device 1000 includes a housing 1200 , a keyboard 1400 and an output device 1600 .
  • the output device shown is a display 1600 , which is preferably a full graphic LCD. Other types of output devices may alternatively be utilized.
  • a processing device 1800 is contained within the housing 1200 and is coupled between the keyboard 1400 and the display 1600 . The processing device 1800 controls the operation of the display 1600 , as well as the overall operation of the mobile device 1000 , in response to actuation of keys on the keyboard 1400 by the user.
  • the housing 1200 may be elongated vertically, or may take on other sizes and shapes (including clamshell housing structures).
  • the keyboard may include a mode selection key, or other hardware or software for switching between text entry and telephony entry.
  • FIG. 18 In addition to the processing device 1800 , other parts of the mobile device 1000 are shown schematically in FIG. 18 . These include a communications subsystem 1001 ; a short-range communications subsystem 1020 ; the keyboard 1400 and the display 1600 , along with other input/output devices 1060 , 1080 , 1100 and 1120 ; as well as memory devices 1160 , 1180 and various other device subsystems 1201 .
  • the mobile device 1000 is preferably a two-way RF communications device having voice and data communications capabilities.
  • the mobile device 1000 preferably has the capability to communicate with other computer systems via the Internet.
  • Operating system software executed by the processing device 1800 is preferably stored in a persistent store, such as the flash memory 1160 , but may be stored in other types of memory devices, such as a read only memory (ROM) or similar storage element.
  • system software, specific device applications, or parts thereof may be temporarily loaded into a volatile store, such as the random access memory (RAM) 1180 .
  • Communications signals received by the mobile device may also be stored in the RAM 1180 .
  • the processing device 1800 in addition to its operating system functions, enables execution of software applications 1300 A- 1300 N on the device 1000 .
  • a predetermined set of applications that control basic device operations, such as data and voice communications 1300 A and 1300 B, may be installed on the device 1000 during manufacture.
  • a personal information manager (PIM) application may be installed during manufacture.
  • the PIM is preferably capable of organizing and managing data items, such as e-mail, calendar events, voice mails, appointments, and task items.
  • the PIM application is also preferably capable of sending and receiving data items via a wireless network 1401 .
  • the PIM data items are seamlessly integrated, synchronized and updated via the wireless network 1401 with the device user's corresponding data items stored or associated with a host computer system.
  • the communications subsystem 1001 includes a receiver 1500 , a transmitter 1520 , and one or more antennas 1540 and 1560 .
  • the communications subsystem 1001 also includes a processing module, such as a digital signal processor (DSP) 1580 , and local oscillators (LOs) 1601 .
  • DSP digital signal processor
  • LOs local oscillators
  • a mobile device 1000 may include a communications subsystem 1001 designed to operate with the MobitexTM, Data TACTM or General Packet Radio Service (GPRS) mobile data communications networks, and also designed to operate with any of a variety of voice communications networks, such as AMPS, TDMA, CDMA, PCS, GSM, etc. Other types of data and voice networks, both separate and integrated, may also be utilized with the mobile device 1000 .
  • GPRS General Packet Radio Service
  • Network access requirements vary depending upon the type of communication system. For example, in the Mobitex and DataTAC networks, mobile devices are registered on the network using a unique personal identification number or PIN associated with each device. In GPRS networks, however, network access is associated with a subscriber or user of a device. A GPRS device therefore requires a subscriber identity module, commonly referred to as a SIM card, in order to operate on a GPRS network.
  • SIM card subscriber identity module
  • the mobile device 1000 may send and receive communications signals over the communication network 1401 .
  • Signals received from the communications network 1401 by the antenna 1540 are routed to the receiver 1500 , which provides for signal amplification, frequency down conversion, filtering, channel selection, etc., and may also provide analog to digital conversion. Analog-to-digital conversion of the received signal allows the DSP 1580 to perform more complex communications functions, such as demodulation and decoding.
  • signals to be transmitted to the network 1401 are processed (e.g. modulated and encoded) by the DSP 1580 and are then provided to the transmitter 1520 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 1401 (or networks) via the antenna 1560 .
  • the DSP 1580 provides for control of the receiver 1500 and the transmitter 1520 .
  • gains applied to communications signals in the receiver 1500 and transmitter 1520 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 1580 .
  • a received signal such as a text message or web page download
  • the communications subsystem 1001 is input to the processing device 1800 .
  • the received signal is then further processed by the processing device 1800 for an output to the display 1600 , or alternatively to some other auxiliary I/O device 1060 .
  • a device user may also compose data items, such as e-mail messages, using the keyboard 1400 and/or some other auxiliary I/O device 1060 , such as a touchpad, a rocker switch, a thumb-wheel, or some other type of input device.
  • the composed data items may then be transmitted over the communications network 1401 via the communications subsystem 1001 .
  • a voice communications mode In a voice communications mode, overall operation of the device is substantially similar to the data communications mode, except that received signals are output to a speaker 1100 , and signals for transmission are generated by a microphone 1120 .
  • Alternative voice or audio I/O subsystems such as a voice message recording subsystem, may also be implemented on the device 1000 .
  • the display 1600 may also be utilized in voice communications mode, for example to display the identity of a calling party, the duration of a voice call, or other voice call related information.
  • the short-range communications subsystem enables communication between the mobile device 1000 and other proximate systems or devices, which need not necessarily be similar devices.
  • the short-range communications subsystem may include an infrared device and associated circuits and components, or a BluetoothTM communications module to provide for communication with similarly-enabled systems and devices.

Abstract

A communications system may include data storage devices each using at least one of a plurality of different operating protocols, and mobile wireless communications devices (MWCDs) for accessing the data storage devices and each using at least one of the different operating protocols. The system may further include a protocol interface device, which may include a protocol engine module for communicating with the data storage devices using respective operating protocols. The protocol interface device may further include a front-end proxy module coupled to the protocol engine. The front-end proxy module may include a respective proxy module for communicating with the MWCDs using each different operating protocol. The front-end proxy module may also include one or more common core service modules coupled to the proxy modules and communicating therewith at a first layer, and communicating with the protocol engine module at a second layer lower than the first layer.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application Nos. 60/493,165, 60/493,167, 60/493,163 filed Aug. 7, 2003, and 60/494,235, 60/494,326, 60/494,255, and 60/494,234, filed Aug. 11, 2003 all of which are hereby incorporated herein in their entireties by reference.
  • FIELD OF THE INVENTION
  • The present invention relates to the field of communications systems, and, more particularly, to communications systems using multiple operating protocols for data access operations and related methods.
  • BACKGROUND OF THE INVENTION
  • The world wide web has become a popular medium to access information. Utilizing Internet protocols, users simply point their web browser to a specified uniform resource location (URL) or Web address to download a Web page from the Internet. The Web page will be retrieved from a Web server, downloaded onto their browser and rendered in a viewable format, to be viewed and enjoyed by the user.
  • In addition to the Web server, certain application servers cooperate with the Web server to assist in serving and rendering the content. Application servers are also involved in other functions such as routing requests, acting on requests, and rendering documents to be sent back to the client.
  • The popularity of Web pages has created different methods to access and serve up Web pages. However, despite the popularity of accessing Web sites, the methods used to access Web data have a number of shortcomings.
  • Often in Web applications, there is no single source for the URL definition, syntax and parameters. One approach to address this shortcoming is to code URLs into source files. However, this method is prone to error and results in complicated logic within the service to handle numerous exception cases. It is also difficult for a developer to know, based on the incoming URL, how the request is routed through the system and which module should respond to the request.
  • A second shortcoming is that there is no control over the parameters passed to a request handler. This causes a similar problem to that mentioned above. As more functionality is needed, further parameters are added to the query string in one location and forgotten in others, resulting in complex logic to validate incoming parameters.
  • A third shortcoming relates to the use of monolithic request handlers having convoluted logic. In many Web applications, there is no real hierarchy of functionality. Requests are lumped together into common categories and then sent to the appropriate handler. The handler has to be able to handle any one of these requests. Over time, the code in these handlers can grow to the extent that they become difficult to manage.
  • A fourth shortcoming is that there are often multiple ways to work around a defined scheme. Since there is no enforceable definition of a URL scheme, it is the developer's responsibility to maintain his code correctly and efficiently. In due time, the URL formats would diverge, making it difficult to understand and maintain the application.
  • Another shortcoming is the lack of defined control flow through the system. Control flow through the system would quickly become very convoluted as developers, needing functionality in another handler, begin to call other handlers directly. Often times, the response from the called handler would be either returned to the caller, or modified, and passed to another handler. The data being passed into the system would be modified as it moves through the system, making it difficult to understand.
  • A further shortcoming relates to passing parameters that are not classified or typed into an HTTP request. The resulting logic required to validate each parameter can be cumbersome and is subject to the interpretation of the developer writing the code. This may also lead to misunderstanding or confusion.
  • Yet another shortcoming relates to the short interval of request timeouts. Attempting to solve this problem without a single point of control would result in complex, error-prone code.
  • SUMMARY OF THE INVENTION
  • In view of the foregoing background, it is therefore an object of the present invention to provide a communications system and related methods which provide enhanced protocol conversion and data access features.
  • This and other objects, features, and advantages in accordance with the present invention are provided by a communications system which may include a plurality of data storage devices each using at least one of a plurality of different operating protocols, and a plurality of mobile wireless communications devices for accessing the plurality of data storage devices and each using at least one of the plurality of different operating protocols. The system may further include a protocol interface device, which may include a protocol engine module for communicating with the plurality of data storage devices using respective operating protocols.
  • The protocol interface device may further include a front-end proxy module coupled to the protocol engine. In particular, the front-end proxy module may include a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol. The front-end proxy module may also include at least one common core service module coupled to the proxy modules and communicating therewith at a first layer and communicating with the protocol engine at a second layer lower than the first layer.
  • By way of example, the first layer may be a network layer, and the second layer may be a data layer. In addition, the protocol interface device may also include a configuration file module coupled to the at least one common core service module for storing a first set of configuration files for configuring common core services at the first layer, and for storing a second set of configuration files for configuring common core services at the second layer. Accordingly, the front-end proxy module provides an extensible architecture that can be modified to accommodate additional common core services, such as those associated with new operating protocols, at both the first and second data layers, for example.
  • More particularly, the at least one common core service module may be for at least one of routing traffic between the proxy modules and the protocol engine module, accessing data from the plurality of data storage devices, and rendering data for the plurality of mobile wireless communications devices. In other words, the front-end proxy module advantageously may be used with numerous types of operating protocols, yet still use common core services to route traffic, access data, and/or render data, which provides for greater efficiency and reduced complexity.
  • Furthermore, the at least one common core service module may include a plurality of handlers for interfacing the proxy modules with the protocol engine module. Moreover, the plurality of proxy modules may convert access requests from the plurality of mobile wireless communications devices to common access parameters. As such, the front-end proxy module may further include a flow controller module for receiving the common access parameters from the plurality of proxy modules and selecting desired handlers for processing thereof.
  • The at least one common core service module may also include a renderer module for cooperating with the proxy modules to format data for the plurality of mobile wireless communications devices. Further, the at least one common core service module may also include an extensible mark-up language (XML) engine module coupled to the renderer module, such as an extensible stylesheet language transformations (XSLT) engine module, for example. Additionally, the at least one common core service module may further include a memory coupled to the XML engine module for storing a plurality of templates corresponding to respective operating protocols.
  • A method aspect of the invention is for interfacing a plurality of mobile wireless communications devices with a plurality of data storage devices. The mobile wireless communications devices and the data storage devices may each use at least one of a plurality of different operating protocols. The method may include providing a protocol engine module for communicating with the plurality of data storage devices using respective operating protocols, and providing a front-end proxy module. More particularly, the front-end proxy module may include a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol, and at least one common core service module coupled to the proxy modules and communicating therewith at a first layer. The at least one common core service module may also communicate with the protocol engine at a second layer lower than the first layer.
  • A protocol interface device in accordance with the invention is for interfacing a plurality of communications devices with a plurality of data storage devices, and may include a protocol engine module and a front-end proxy module, such as those described briefly above. In addition, a computer-readable medium in accordance with the invention may similarly include a protocol engine module and front-end proxy.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic block diagram of a communications system in accordance with the present invention.
  • FIG. 2 is a schematic block diagram illustrating the protocol interface device of the communications system of FIG. 1 in greater detail.
  • FIG. 3 is a schematic block diagram illustrating the extensible front-end proxy module of the protocol interface device of FIG. 2 in greater detail.
  • FIGS. 4 and 5 are schematic block diagrams illustrating an alternate embodiment of a communications system in accordance with the invention implementing an extensible proxy architecture similar to that of FIG. 3.
  • FIG. 6 is a schematic block diagram of an alternate embodiment of the protocol interface device of FIG. 2.
  • FIG. 7 is a schematic block diagram further illustrating the protocol engine module of the protocol interface device of FIG. 3 and interface connector modules therefor.
  • FIG. 8 is a schematic block diagram of an alternate embodiment of the protocol engine module and interface connector modules of FIG. 7.
  • FIG. 9 is a schematic block diagram of still another alternate embodiment of the protocol interface device of FIG. 2.
  • FIG. 10 is a schematic block diagram of yet another alternate embodiment of the protocol interface device of FIG. 2.
  • FIG. 11 is a flow diagram illustrating operation of the protocol interface device of FIG. 2.
  • FIG. 12 is a flow diagram illustrating operation of the front-end proxy module of FIG. 3.
  • FIG. 13 is a flow diagram illustrating operation of the communications system of FIG. 5.
  • FIG. 14 is a flow diagram illustrating operation of the protocol interface module of FIG. 6.
  • FIG. 15 is a flow diagram illustrating operation of the protocol engine and interface connector modules of FIG. 7.
  • FIG. 16 is a flow diagram illustrating operation of the protocol interface device of FIG. 9.
  • FIG. 17 is a flow diagram illustrating operation of the protocol interface device of FIG. 10.
  • FIG. 18 is a schematic block diagram of an exemplary mobile wireless communications device for use with the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout, and prime notation and multiple prime notation are used to indicate similar elements in alternate embodiments.
  • Turning now to FIG. 1, a communications system 10 includes a protocol interface device 14 that provides access to a plurality of data storage devices or systems 16, 18, 20. The communications system 10 illustratively includes a plurality of communications devices, namely a mobile wireless communications device 11 and a communications device 12 connected to the system via a wired connection. By way of example, various mobile wireless communications devices may be used in accordance with the invention, such as personal data assistants (PDAs), cellular telephones, etc. An exemplary mobile wireless communications device 11 suitable for use with the present invention is described in the example provided below with reference to FIG. 18. Moreover, examples of wired communications devices include personal computers, telephones, fax machines, etc. Of course, numerous wired and wireless devices may be used, although only two are shown in the exemplary embodiment for clarity of illustration.
  • The communications devices 11, 12 typically include software clients, which are software modules or applications that operate on or in conjunction with their respective communications device to provide access to data stored at one or more of the data storage devices 16, 18, and 20 through the protocol interface device 14. Those skilled in the art will appreciate that such communications devices also include further components and/or software modules, which have not been explicitly shown in FIG. 1 for clarity of illustration. With respect to the mobile wireless communications device 11, its software client communicates with the protocol interface device 14 via a wireless communication network 13, and perhaps other networks as well (e.g., a public switched telephone network (PSTN) or the Internet), as will be appreciated by those skilled in the art.
  • The various functions and operations of the protocol interface device 14 are preferably implemented in software operating thereon, or in conjunction therewith. The protocol interface device 14 illustratively bridges the software clients of the communications devices 11, 12 and the data storage devices 16, 18, 20. Communications between the protocol interface device 14, the communications devices 11, 12, and the data storage devices 16, 18, 20 are preferably via a wide area network (WAN) such as the Internet. That is, the communications devices 11, 12 may communicate with the protocol interface device 14 via the Internet, as noted above, and so too may the protocol interface device communicate with the data storage devices 16, 18, 20.
  • Of course, other implementations are also contemplated. For example, the protocol interface device 14 may be implemented in a private network that also includes the data storage devices 16, 18, 20, the communications devices 11, 12, or both the data storage devices and the communications devices (e.g., in a WAN). It should be noted that the present invention is in no way limited to any particular connection or communication scheme.
  • The data storage devices 16, 18, 20 store data to be accessed by the software clients of the communications devices 11, 12. Although some software clients are configurable to directly access certain types of data storage devices, they are often data system specific or protocol specific, as described briefly above. More particularly, on constrained electronic devices such as the mobile wireless communication device 11, processor power, memory resources, and communication channel characteristics may preclude the installation and operation of software clients having the same capabilities as those commonly used on desktop and laptop computer systems, for example. In addition, while the installation of multiple software clients for accessing data storage devices associated with different protocols is feasible for desktop and laptop computer systems, providing multiple-protocol support on such constrained devices may not be possible.
  • The data storage devices 16, 18, 20 are accessible using different operating protocols or access schemes. As such, the protocol interface device 14 accesses the data storage devices 16, 18, 20 via an operating protocol supported by respective data storage devices, and provides data to the communications device 11, 12 via a respective client-supported operating protocol. The protocol conversion functionality of the protocol interface device 14 provides a unified approach to support access to multiple types of data system. As described in further detail below, the protocol interface device 14 provides an “any-to-any” bridge between different protocols or access schemes.
  • The protocol interface device 14 is illustrated in further detail in FIG. 2. As noted above, the protocol interface device 14 bridges different types of communications devices with different types of data storage devices. In the illustrated embodiment, data storage devices 24, 26, 28 are systems/servers for storing electronic mail (e-mail). However, it should be noted that the present invention is not limited to mail system access. Each of the mail systems 24, 26, 28 supports a different operating protocol or access scheme. More particularly, the mail system 24 supports Outlook Web Access (OWA), the mail system 26 supports Microsoft Messaging Application Programming Interface (MAPI), and the mail system 28 supports a proprietary protocol, such as that used by America Online (AOL), for example.
  • The protocol interface system 14 illustratively includes a front-end proxy module 30. The front-end proxy module illustratively includes proxy modules 34, 36, 38, 40 which respectively support the Wireless Application Protocol (WAP), the Post Office Protocol (POP), the Internet Message Access Protocol (IMAP), and the Hypertext Transfer Protocol (HTTP) for communication with clients.
  • The front-end proxy 30 also communicates with a protocol engine module 32. The protocol engine module 32 translates OWA, MAPI, the proprietary protocol of the mail system 28 (and other protocols, if desired) into a format compatible with the front-end proxy module 30. To this end, a respective interface connector module may 70-77 (FIG. 7) be coupled to the protocol engine module 32 for each of the operating protocols used by the mail systems 24, 26, 28, as will be discussed further below. In a preferred embodiment, the front-end proxy module 30 and the protocol engine module 32 are extensible or expandable to accommodate additional operating protocols as they become available, as will also be discussed further below.
  • In operation, a user accesses a mailbox on one of the mail systems 24, 26, 28 through client software on his communications device. For example, a WAP browser on a mobile wireless communication device communicates with the WAP proxy module 34 to access the mail system 24. Access commands or instructions received by the WAP proxy 34 are converted into a format compatible with the protocol engine module 32. Communications between the front-end proxy module 30 and the protocol engine module 32 are preferably achieved via a common interface protocol, which may be a proprietary protocol or an established public protocol.
  • The protocol engine module 32 then translates the access commands or instructions received from the front-end proxy module 30 into a protocol associated with the mail system to be accessed (e.g., OWA for the mail system 24). Data received from the mail system (e.g., e-mail messages, a list of new messages, calendar appointments, tasks, etc., depending on the particular mail system), the features that its access protocol supports, and the nature of the access command are translated into the common interface protocol and transferred to the front-end proxy.
  • The active proxy module (i.e., the WAP proxy module 34 in the present example) then formats the received data, or at least portions thereof, for the requesting client. Further commands from the client are also translated by the protocol interface device 14. Access commands from other types of clients are similarly processed. It should be noted that several mail systems may be accessed in response to a single access command, where a user has enabled multiple mailbox access through the protocol interface device 14.
  • The protocol interface device 14 thus allows clients using different operating protocols to access the mail systems 24, 26, 28, which also use different operating protocols. Access commands such as move, delete, create, send, fetch, and view, for example, that are generated at a client affect the data stored at the mail systems 24, 26, 28 instead of copies of the data. Through the protocol interface device 14, a client compatible with any one of the proxy modules 34, 36, 38, 40 is provided access to one or more of the mail systems 24, 26, 28. The client itself advantageously need not support the access protocol or scheme associated with the mail system(s) to be accessed.
  • Since the mail system protocol and the client protocol need not be compatible, feature support between the protocols may be different. For example, a POP client does not support the same features as OWA. The interface protocol used between the protocol engine module 32 and the front-end proxy module 30 is preferably designed to be able to represent a desired number of protocol-supported elements or features for a desired operating protocol. More specifically, the common interface protocol is preferably able to represent all protocol-supported elements for the most “capable” protocol (OWA in the present example), to provide the broadest possible feature support. Further still, the common interface protocol may support a full feature set across all supported protocols, if desired.
  • By way of example, the common interface protocol may be a proprietary protocol based on the Web-based Distributed Authoring and Versioning (WebDAV) protocol. An example of an authentication request using such a common interface protocol is provided as program listing #1, below. This exemplary authentication request routine allows the protocol interface device 14 to be authenticated by a mail system using a user identifier and password provided by a user, and it also retrieves a root folder and basic capabilities of a target mailbox on the mail system.
  • An exemplary inbox request in accordance with a WebDAV-based common interface protocol is set forth below as program listing #2. In accordance with this routine, responsive to an inbox request, the capabilities of the inbox in a target mailbox are queried, and then its contents are queried. Another example is provided below as program listing #3, which is for a folder search request in accordance with the aforementioned WebDAV-based common interface protocol. Here, a list of subfolders for a given folder is returned in response to this request. It will be appreciated by those skilled in the art that numerous other requests and operations may be used as well.
  • It should be noted that the software clients need not initiate data access requests in all embodiments. For example, in some embodiments the protocol interface device 14 may include (or communicate with) a polling or aggregation engine module (not shown) that prompts the protocol engine module 32 to aggregate messages for respective users from the mail systems 24, 26, 28 at predetermined intervals, as will be appreciated by those skilled in the art. The protocol engine module 14 would then cooperate with the front-end proxy module 30 to provide the aggregated messages to the respective software clients, as described above. Additionally, the front-end proxy module 30 need not communicate directly with the communications devices 11, 12 in all embodiments, but it may instead communicate therewith via an intervening mail system or server, for example. Thus, in the case where an aggregation engine module is used, the aggregated messages may be first transferred by the front-end proxy module 30 to an intervening mail server, which in turn provides the messages to the appropriate communications device, as will also be appreciated by those skilled in the art. Here again, the front-end proxy module 30 would use the appropriate protocol(s) supported by such intervening mail server for communicating therewith.
  • A method for providing access to a plurality of data storage devices, such as the mail systems 24, 26, 28, using the protocol interface system 14 is illustrated in FIG. 11. Beginning at Block 110, an access command or data is first received, at Block 111. The access command or data is translated into the common interface protocol, at Block 112. An access command is then translated (Block 113) into a data system protocol associated with the data system to be accessed, such as OWA for the mail system 24, for example.
  • On the other hand, data is translated into the client protocol, at Block 113. Depending upon the particular features supported by the client protocol, only those portions of the data corresponding to elements of the interface protocol that are supported by the client protocol are translated during this step. The protocol interface device 14 may generate an error responsive to a non-supported operating protocol. More particularly, non-supported interface protocol elements are preferably ignored or processed according to a default or error-processing scheme. Translated access commands or data are then transferred to a data system or a client, at Block 114, thus concluding the illustrated method (Block 115).
  • Turning now additionally to FIG. 3, an exemplary embodiment of the front-end proxy module 30 is now described. The front-end proxy module 30 illustratively includes the proxy modules 34, 36, 38, 40, a renderer module 44, an extensible stylesheet language transformations (XSLT) engine module 46, a memory or template store 48, a flow controller module 50, and handlers 52 a-52 n.
  • As noted above, each proxy module 34, 36, 38, 40 effectively “fronts” the protocol engine module 32 and translates respective operating protocols for different client types. For example, a WAP proxy module provides information retrieved from one or more of the handlers 52 a-52 n in the form of WML documents targeted for display on devices such as cell phones and PDAs. A POP proxy makes use of at least some of the same proxy components, including the flow controller module 50 and the renderer module 44 to render data in the form required by the POP protocol.
  • One particularly advantageous benefit of the illustrated front-end proxy module 30 is that each proxy module 34, 36, 38, 40 makes use of the same core services to route traffic, access data, and render data. In other words, the renderer module 44, XSLT engine module 46, template memory 48, flow controller module 50, and handlers 52 a-52 n provide a common core service module for the proxy modules 34, 36, 38, 40. The only differences between translations by the different proxy modules 34, 36, 38, 40 would be in the configuration of the flow controller 50, the handlers 52 a-52 n, and the XSL templates used to translate the data into its final form. It many cases, the same handlers 52 a-52 n will be re-used between by the various proxy modules 34, 36, 38, 40, as will be appreciated by those skilled in the art.
  • During operation, a data access request from a client is passed to the appropriate proxy module 34, 36, 38, 40 using standard mechanisms for the client protocol. For a WAP client, for example, parameters are passed via a query string and/or form variables. The WAP proxy module 34 determines a component identifier (which identifies a target item such as a mail folder), an action identifier (which identifies an action to be performed), and any parameters based on data in the request. In the case of WAP, the component and action identifiers are passed in the query string or form. Other parameters in the query string or form are packaged into a parameter list.
  • The active proxy module then calls the flow controller 50, passing along the identifiers and parameter list. The flow controller looks up the appropriate handler via the component and action identifiers and constructs the handler, passing the parameters as arguments to a constructor (not shown). Using the handler 52 a as an example, this handler would processes the request, using a data layer (FIG. 5) to gather information needed for a response.
  • For mail system access, for instance, the data layer communicates with the protocol engine module 32 for any information related to the contents of the user's mailbox, calendar, or address book, for example. Communications with other components may be established for different types of information, such as information related to authentication services and a user's e-mail account. The handler 52 a then decides whether the request should be forwarded to another handler, or if its results should be rendered.
  • All information passed back by the handlers 52 a-52 n is preferably in a common format, such as org.xml.sax.InputSource, for example, a provider of extensible mark-up language (XML) data. The active proxy module then calls the renderer module 44, passing along the InputSource, locale information, the name of the template to be rendered, and an OutputStream. The renderer module 44, making use of the XSLT engine 46, renders the page into the OutputStream. The OutputStream is then provided to the client by the active proxy module using the client protocol.
  • The above system provides a generic application framework following the classic model/view/controller (MVC) architecture that implements most of the application infrastructure. One important feature is that a base set of functionality may be defined for similar services and then extended to provide the service-specific functionality required to fully implement a given service. Within a given implementation, the flow controller 50, the handlers 52 a-52 n, and/or the data access layer are fully extensible or replaceable.
  • With this in mind, supporting a brand new service simply involves defining and implementing the data layer, defining the control flow and discrete actions within the system (i.e., the flow controller module 50), and defining and implementing the interface with the service (i.e., the renderer module 44). On the other hand, supporting a new type of client with an existing service involves making minor changes to, and extending actions within, the flow controller module 50 and handlers 52 a-52 n to support additional client-required functionality, and defining and implementing the interface between the client and the system (i.e., the renderer module 44).
  • Operation of the front-end proxy module 30 to perform protocol translation is further described with respect to the block diagram of FIG. 12. Certain of the illustrated operations have been described in detail above, and thus will be described only briefly below to avoid undue repetition. Beginning at Block 120, an access request or command is received at a proxy module 34, 36, 38, 40, at Block 121. The access request is translated into the common interface protocol by one or more of the handlers 52 a-52 n, at Block 122.
  • Data is received from a given mail system 24, 26, 28 in response to the request, at Block 123. This data, which has already been translated into the common interface protocol by the protocol engine module 32, is rendered (Block 124) and returned to the client, at Block 125, thus concluding the illustrated method (Block 126). Depending upon the particular features supported by the client protocol, only portions of the data corresponding to elements of the common interface protocol that are supported by the client protocol are rendered or translated. Non-supported interface protocol elements may be ignored or processed according to a default or error processing scheme, as noted above.
  • It should be noted that the extensible, common core service architecture of the front-end proxy module 30 may also be used for a variety of applications. One such application is to address various shortcomings of the disparate methods used to respond to HTTP requests from a Web application. Referring now to FIGS. 4 and 5, a Web data access system 100 having an extensible architecture in accordance with the present invention is now described. The components of the Web data access system 100 communicate bi-directionally, and they illustratively include a user request 101, a Web server 102, a proxy server 104, and an extensible controller system 106.
  • More particularly, the user request 101 refers to a user using a web browser or web application to request a web page (e.g., from a PDA or personal computer). Once the request is made, the Web server 102 processes the request. The proxy server 104 assists the Web server 102 in processing the request. For comparison purposes, the proxy server 104 here functions similar to the protocol interface device 14 discussed above, and the extensible controller system 106 would be implemented as a software module that is run on or in conjunction with the proxy server, as will be appreciated by those skilled in the art. Of course, in some embodiments the proxy server 104 and extensible controller system 106 could be implemented in different physical devices or servers, for example.
  • The proxy server 104 provides a process of providing cached or storage items available on other servers which are slower or more resource intensive to access. The proxy server 104 accepts URLs with a special prefix. When it receives a request for such a URL, it strips off the prefix and looks for the resulting URL in its local cache. If found, it returns the document immediately, otherwise it fetches it from the remote server, saves a copy in the cache, and returns it to the requester. The pages returned by the proxy server 104 can be either static or dynamic in nature. The proxy server 104 may communicate with application servers or data servers, and in this specific embodiment, the extensible controller system 106.
  • More particularly, the components of the proxy server 104 illustratively include an aggregate server 202, a renderer module 212, an XSLT engine module 214, and a memory 216 for storing a series of templates, similar to those described above. The components of the extensible controller system 106 include an action map 204, and a series of handlers 206, also similar to those discussed above.
  • The aggregate server 202 performs the processing of incoming information and passes it onto other components for assistance. The renderer module 212 renders the resultant data into a viewable format. The renderer module 212 makes use of the XSLT engine module 214 and any necessary templates from the memory 216 to render the page.
  • The aggregate server 202 sends data to the action map 204, which maintains the control flow and handles the business logic in the system. The action map 204 interacts with a series of handlers 206. The handler 206 utilizes the data layer 208 to retrieve information from other data sources 210. The other data sources 210 may include, for example, XML for web data, a universal proxy for any information related to the contents of user applications (e.g., e-mail, calendar or contact), or a provisioning API for authentication services and data relating to a user account.
  • The system functions by having a user send in a URL as a user request 101. This request is received at the Web server 102, which passes on to the proxy server 104 for processing using standard mechanisms for the protocol. For example, a WML request would pass a WAP parameter query string and/or form variables. The aggregate server 202 component of the proxy server 104 determines the component ID, action ID and any parameters based on data in the request. Using the same WAP example, the component and action IDs are passed in the query string or form. All other parameters in the query string or form are packaged up into a parameter list.
  • The aggregate server 202 then calls the action map 204 of the extensible controller system 106 and passes along the IDs and parameter list. The action map 204 looks up the appropriate handler 206 via the component and action IDs and constructs the handler, passing the parameters as arguments to the constructor. The handler 206 processes the request, using the data layer 208 to gather information needed for a response. The data layer 208 will retrieve information from other data sources 210 located within the network or external to the network. The handler 206 then decides whether the request should be forwarded to another handler 206, or if its results should be rendered.
  • If the system decides to render the data, the data is passed from the handler 206, back to the action map 204, and back to aggregate server 202 of the proxy server 104. The aggregate server 202 then calls the renderer module 212, which invokes the XSLT engine module 214 and any necessary templates to render the data into a viewable output. This output is then returned to the Web server 102 to serve the data as a viewable web page as a result of the user request 101.
  • The various steps involved in processing Web data using the extensible controller system 106 will now be further described with reference to FIG. 13. More particularly, this diagram illustrates in greater detail the processing and interaction of the proxy server 104 and the extensible controller system 106. The system flow begins with a user request 101. This request is sent to the Web server 102, which passes the information to the proxy server 104 for processing. The proxy server 104 invokes the aggregate server 202 for processing.
  • The aggregate server 202 determines whether a context is available, at Block 302. If it is available, the system will move to the next step to mine the IDs (Block 306). If it is not available, the system will first create the context, at Block 304, and then continue onto the step to mine the IDs, at Block 306. The action ID and component ID are also mined out of the system. These IDs, along with the request parameters and any form data, are packaged into an envelope and gathered together, at Block 308.
  • An invoke procedure is called to pass the data from the aggregate server 202 to the action map 204 of the extensible controller system 106. This invoke procedure will pass information pertaining to the envelope, an action code, the component ID and context info to the action map 204. The action map 204 looks up the action, at Block 310, and determines whether the action exists, at Block 312. If it does, then it moves to the next step to determine whether the action requires authentication, at Block 316. If the action does not exist, the system retrieves the default action, at Block 314, and then determines whether the action requires authentication, at Block 316.
  • At this point, if the action does not require authentication, the system determines if any requests are pending, at Block 320. If the action does require authentication, the system then determines whether the context is in an authenticated state, at Block 318. If the context is in an authenticated state, the system then determines whether a request is pending, at Block 320. However, if the context is not in an authenticated state, the system returns the request to the retrieve default action, at Block 314, until authentication is accepted.
  • At Block 320, the system determines if a request is pending. If a request is pending, the system executes on the pending request and jumps to next stage, determining whether a process is in queue, at Block 346. If no request is pending, the system executes on the action and validates on the envelope data, at Block 322, and passes control to the handler 206 to create the action handler, at Block 324. Once the action handler is created, it is initialized, at Block 326.
  • The system then determines whether background processing is allowed, at Block 328. If so, a background handler is created, at Block 344, and the system determines whether a process is in queue, at Block 346. However, if background processing is not allowed, the system then processes the action handler, at Block 330, and then returns the result, at Block 332. Revisiting the system, at Block 346 the system determines whether a process is in the queue. If the process is in the queue, it then determines whether the action is complete, at Block 350. If the process is not in the queue, then it submits it to the queue, at Block 348, and then determines whether the action handler is complete, at Block 350.
  • If the action handler is complete, the system returns the action handler result, at Block 352. If the action handler is not complete, the system returns the pending render result, at Block 354. The output of the steps illustrated at Blocks 352 and 354 (returning either an action handler result or pending renderer result) will be used to determine whether to render the result, at Block 334.
  • More particularly, the results of the steps illustrated at Blocks 332 (return result), 352 (return action handler result) and 354 (return pending render result) are used to determine whether to render the result (Block 334). If the system decides to render the result, the system sends the data from the extensible controller system 106 to the proxy server 404 and renders the data, at Block 340, at the renderer module 212. The data is then passed onto the Web server 102 to display the result, at Block 342, as a response to the user request 101. However, if the system decides not to render the result and has instead decided to forward the request to another action handler for processing, the system retrieves the ID keys, at Block 336, retrieves the envelope data, at Block 338, and then looks up the appropriate action, at Block 310. The system will loop around at this point until a decision to render a result is ultimately accepted, at Block 334.
  • The above-described method involves using a single source for defining the components within the system. In this particular embodiment, the source is an XML file, but other formats could be used as well, as will be appreciated by those skilled in the art. This source would define the code that handles the request, the URL syntax and parameters, templates or code used to generate the response for the request, and the routing information for the request, for example.
  • The code that handles the request, along with the parameter definition, is used by the system to create the action handler, pass the correctly typed parameters, and pass control to it for processing. The parameters include type information allowing for strongly typed data. The parameters may also be defined as optional or required. The template or templates are used to generate the response for the request. If an attempt is made to generate a response other than to what was defined an error is generated.
  • The source would also define the routing information for the request. Often times, it is desirable for a handler to perform work within its scope and then hand off control to another handler to allow it to perform its work. However, if the handler attempts to hand control to something not defined in the source, an error is generated.
  • Other variations are also possible. For example, the source may be used whenever generating URL's for use within the system. Moreover, request routing may be separated from the actual processing of those requests. Control flow is then handled by one component of the system, not by each handler. The handler would then simply ask the controller to forward a request to another handler. Thus, incoming data may be kept in a known state for the life of a particular request.
  • Yet another approach involves enforcing control flow through the system where one handler does not call another handler directly to do its work. Still another approach involves keeping the handlers relatively small and simple. That is, this will limit the handler's purpose and scope to receiving requests and calling the appropriate business logic to gather the desired results. Another variation involves keeping each handler focused on one task, and upon completion of the task, allowing the results to be rendered or forwarded on to the next handler.
  • A further variation involves providing an extensible mechanism for handling requests that can handle immediate needs, as well as grow over time without becoming overly complex. When loading the system, the user is able to specify a primary and secondary action map. In this way, generic business logic and control flow may be specified by the primary action map while still providing the user with a method of adding or modifying the functionality. Another approach is to provide the developer with a generic mechanism for responding quickly to long running requests to avoid generating a timeout. This enables the developer to specify background processing at either a handler level, or at the entire system.
  • The above-described extensible controller is particularly advantageous for addressing shortcomings in Web or HTTP-based applications. Of course, it will be also appreciated by those skilled in the art that this same architecture may be extended to support other types of non-HTTP based applications as well.
  • Turning now to FIG. 6, an alternate embodiment of the protocol interface device 14′ is now described. In the illustrated embodiment, all requests to a data storage device, such as the mail systems 24′, 26′, 28′, are defined in configuration files stored in a configuration file store or memory 31′. In this way, for a given client category, an application developer can easily request only those properties required to support the client for which it was written.
  • A resource manager, which may be part of the front-end proxy module 30′ or a separate component of the protocol interface device 14′, advantageously allows a user to specify a primary and secondary set of configuration files. If a secondary configuration file is specified, any resources defined in it will override those specified in the primary configuration file. This allows the user to specify a core set of resources and then tweak them to fit a particular implementation.
  • Moreover, configuration files may be stored for processing operations at different network layers. For example, configuration files for data layer operations for interfacing the front-end proxy module 30′ and protocol engine module 32′ may be stored in the memory 31′, as well for upper network layer operations performed by the flow controller module 50, for example. Other types of configurations files may be used as well, as will be appreciated by those skilled in the art.
  • A configuration file also preferably specifies the implementation class that is created to handle the response to a given request. This makes it a simple matter to slightly change the behavior of an object in a data model, or even completely replace it. Caching behavior and strength for each request may also be specified in a configuration file. With a combination of these two properties, a developer can have much greater control over memory consumption and response/request performance.
  • In addition, configuration files also allow a user to specify multiple requests for a given resource. This makes it possible to support data systems with different request/response formats. An exemplary configuration file is provided below as program listing #4. This configuration file is suitable for a data store that supports a WebDAV interface, as discussed above, or in the case of the protocol interface device 14′, a protocol engine that supports a WebDAV interface. However, it could be used for other types interfaces/data stores as well.
  • It should also be noted that, in addition to the content class specified for the resource, a user may also specify a command to further identify a given resource. This allows the user to perform multiple different operations on a given resource type, as will be appreciated by those skilled in the art.
  • Operation of the protocol interface device 14′ using configuration files will now be described further with reference to FIG. 14. Beginning at Block 140, an access request or command is received at a proxy module, at Block 141. The access request is translated into the common interface protocol by a handler 52 a-52 n, at Block 142, with reference to one or more configuration files. Data that is received from the data system (Block 143) in response to the request, and which has already been translated into the common interface protocol by the protocol engine module 32′, is formatted into a response and rendered, at Block 144. Again, this is done with reference to one or more configuration files. The rendered response is then returned to the client (Block 145), thus concluding the illustrated methods, at Block 146.
  • Referring now additionally to FIG. 7, the protocol engine module 32 will now be described in further detail. The protocol engine module 32 provides a framework to incorporate various interface connector modules 70-77 that communicate with various mail systems using different protocols. The protocol engine module 32 also provides a common interface XML and WebDAV, for example, that the clients, through the front-end proxy module 30, use to access various mail accounts. Common operations like retrieving only the essential headers of new mail and determining the presence and size of attachments without downloading them are highly efficient. All operations are performed directly on the source, and only the essential data is retrieved.
  • The protocol engine module 32 uses an appropriate one of a plurality of interface connector modules 70-77 to access a mail account. All of the connector modules 70-77 preferably support a common application programming interface (API), such that adapting the protocol engine module 32 to support a new protocol amounts to simply adding a new interface connector module. The connector modules 70-77 may be written in Java, for example, although other suitable languages or protocols may also be used. Overall system performance and availability may be improved, for example, by providing multiple dynamically load-balanced protocol engine machines.
  • Results received by the protocol engine module 32 from the mail systems 24, 26, 28 are similarly translated into the common interface protocol for translation into a client-supported protocol, if necessary, and transmission to a client. The results communicated back to a client preferably include only data that was requested by the client. Data corresponding to features that are supported by a mail system protocol but not by a client protocol may be translated into the common interface protocol, but it may also be ignored or handled according to a default or error processing scheme, as noted above.
  • A method of protocol translation using the protocol engine module 32 and interface connector modules 71-77 is now described with reference to FIG. 15. Beginning at Block 150, an access request or command is received, at Block 151. The access request is translated into a protocol supported by the target data system, at Block 152. Data is received from the data system in response to the request, at Block 153, and it is translated into the common interface protocol, at Block 154. Further translation of the data into a client protocol may be performed, if necessary, at Block 155, and the data transmitted to the client at Block 156, thus concluding the illustrated method, at Block 157.
  • Again, depending upon the particular features supported by the client protocol, only portions of the data corresponding to elements of the common interface protocol that are supported by the client protocol are translated. As described above, non-supported interface protocol elements may be ignored or processed according to a default or error processing scheme.
  • Turning now to FIG. 8, an alternate embodiment of the above-described protocol conversion module architecture is now described. Here, the protocol engine module 32 takes the form of a universal proxy (UP) servlet module 80, and each interface connector module 81, 82, 83 and a respective provider module 84, 85, 86 are associated with different operating protocols. In the illustrated example, the different protocols are OWA, IMAP, and POP. Further or different protocols may be supported by corresponding provider/connection pairs, as will be appreciated by those skilled in the art.
  • For a common interface protocol, such as the proprietary interface protocol described above, the UP servlet module 80 takes incoming common format requests and translates them into calls, using the defined interfaces, to the interface connector modules 81-83. The UP servlet module 80 also takes the results of these calls and formats them into common format requests. Each common format request includes a method request and a path in the form of a URL. It may also include an XML document that provides additional parameters for the request.
  • Conceptually, below the UP servlet module 80 there is a provider module 84-86 for each supported mail system protocol. The providers take care of handling the calls made by the UP servlet module 80. As shown, each provider has a connection, which takes care of communicating with the source mailbox/account on a target mail system. Initially, the connection will also be the provider.
  • The interfaces used by the UP servlet 80 and implemented by the provider modules 84-86 define a loose folder hierarchy. In fact, it may be conceptualized as a collection of collections of items. An item can be a message, a folder, or a contact, for example, or any other data item to be represented. Each item has a defined type (e.g., mail, contact, appointment). An interface for each type of item defines the properties and actions that are available for that type of item. A folder item includes a collection of items, and provides methods to enumerate the items within a folder.
  • The connector interface modules 81-83 provide a common way for the UP servlet module 80 to communicate with different provider modules/interface connector modules. Some connector modules may only implement a subset of the protocol and/or may only support a single folder (collection) of items, as in the case of POP.
  • The basic flow for an exemplary common format request proceeds as follows. The UP servlet module 80 receives the request, and it either retrieves or creates the appropriate provider/connection. The UP servlet module 80 then calls an appropriate “get folder” or similar function associated with the interface connector module, passing a target mail system identifier, such as a URL that was included in the common format request. The interface connection module returns a reference to some object that implements the folder interface and represents the requested folder. In its simplest implementation (e.g., POP), a single object could be the interface connector module and also represent the mailbox folder.
  • The UP servlet module 80 uses the returned folder reference to make additional calls to satisfy the common format request. For example, if the UP servlet module 80 needs to retrieve a specific item, it may first call a “get folder” function, passing the requested URL, and after it has the folder, it will then call a “get item” function, again passing the URL. The results of the call(s) are then formatted into an appropriate format, such as XML, and returned in an HTTP response.
  • It will be up to the provider module/interface connection module to interpret a URL passed in and return the appropriate reference. This will not be complicated because the provider module/interface connection module provides the URLs in the first place. The only URL that any interface connection module will be required to know about is “\”. All other URLs are generated by the provider/connection. As long as the URLs within the hierarchy/collections are unique, the provider will be able to resolve to the correct item when a “get” function is called.
  • The provider modules 84-86 and interface connection modules 81-83 preferably support a root folder. If only a root folder is supported, then inbox, calendar, and contact items (as appropriate) should be items within that folder if they are to be accessible through a protocol engine.
  • In accordance with one aspect of the invention, a single, advantageous mechanism to access various types of protocols is provided. This mechanism supports the full functionality of each data system protocol for similarly capable client protocols, and degrades when a specific data system protocol feature is not supported by a client protocol. Requests received in a common format are translated into a provider/protocol specific format before forwarding the request on to the destination server. Responses from the destination server, which are in provider/protocol specific format, are translated back into the common format.
  • A mechanism for a client to query supported functionality for a specific provider module, giving the client greater control over how it generates requests to the provider, is also provided. Any client written to support the common protocol format, directly or through a proxy, can easily provide access to any mail store without concerning itself with the details of the mail store provider module/protocol.
  • Referring now additionally to FIG. 9, another embodiment of the protocol interface device 14″ is now described. Here, user e-mail account information associated with e-mail accounts to be accessed through the protocol interface device 14″ is stored in a data store 90″. The per-account information preferably includes an indication of the access protocols supported for each e-mail account.
  • Records in the data store 90″ may be arranged by an account identifier, such as an e-mail address, or by a user name associated with the protocol interface device 14″ such that all e-mail account information for particular users is grouped in the data store 90″, for example. Where access protocol support is the same for all e-mail accounts on each of the mail systems 24″, 26″, the per-account information may include mail system information indicating the operating protocols supported by each mail system.
  • A data store 91″ stores a list of all operating protocols supported by the protocol engine module 32″, and corresponding metrics (i.e., ranking) representing protocol preferences. These metrics are calculated based on capability criteria, such as the degree to which features of each mail system 24″, 26″ are supported by a protocol and the security level of a protocol, for example. Other criteria may also be used and will be apparent to those skilled in the art. In the data store 91″, OWA would typically have a higher metric or ranking than MAPI, and IMAP would generally be ranked higher than POP. Each of the data stores 90″, 91″ may be implemented, for example, in a database on a local hard disk or other memory at the protocol interface device 14″, or on a file server with which the protocol interface device communicates.
  • The protocol engine module 32″ determines to which mailbox(es) or account(s) the command or instruction relates, and then accesses the per-account information in the data store 90″ to determine whether more than one access protocol is supported for each account to be accessed. If only one access protocol is supported, then that protocol is selected. Where more than one access protocol is supported for the account, then the protocol engine module 32″ accesses the data store 91″ to determine which supported protocol is preferred or desired, and the supported protocol with the highest metric or ranking is selected. For the mail system 24″, OWA is preferably selected over MAPI, and for the mail system 26″, IMAP is preferably selected over POP.
  • The protocol interface device 14″ thus allows access to the mail systems 24″, 26″ using a most capable supported protocol. Through the protocol interface device 14″, a client compatible with any of the proxy modules 34″, 36″, 38″, 40″ is provided access to one or more of the mail systems 24″, 26″. The client itself need not support the access protocol or scheme associated with the mail system(s) to be accessed.
  • A method of data system access protocol selection using the protocol interface device 14″ is now described with reference to FIG. 9. Beginning at Block 160, an access command is received from a client at Block 161. A determination is made (Block 162) as to whether each data system to be accessed in response to the command supports more than one access protocol. If so, then the most capable supported protocol is selected, at Block 164. Otherwise, the one supported protocol is selected, at Block 163. Each data system is accessed using the selected protocol, at Block 165, thus concluding the illustrated method, at Block 166. Where more than one data system is to be accessed, the protocol selection steps illustrated at Blocks 162-164 are preferably repeated for each data system.
  • It should be noted that the protocol and metric data store 91″ is but one example exemplary of a protocol preference ranking technique that may be used in accordance with the present invention. Protocol preferences may be inherent in the ordering of a list of supported protocols, for example.
  • Further criteria than metrics or overall preferences may also be considered when selecting a protocol. The type of client from which the access command is received may also affect protocol selection. Where the access command is received from a POP client, for example, many of the enhanced features supported by OWA cannot be represented in POP for transfer to the device. If a user has only one type of client for accessing the protocol interface device 14″, then the per-account information may be adapted to reflect the type of client or to limit the list of supported protocol based on the type of client. Otherwise, a further step in protocol selection may be to determine the type of client from which an access request is received.
  • Alternatively, a most capable protocol supported by a data system to be accessed may always be selected, and any incompatibility between the selected access protocol and the protocol supported by the client is handled during translation of data to the client protocol. Portions of data corresponding to elements of the interface protocol that are supported by the client protocol are translated, whereas non-supported interface protocol elements are ignored or processed according to a default or error processing scheme.
  • Generally speaking, clients often access servers through proxies. Also, the latency is often positively correlated to the cardinality of the collection being accessed (e.g., number of email messages in the mailbox being accessed). As will be evident from the following description, the present invention provides an apparatus and technique that may be used by the proxy to give the client the illusion that the collection being accessed is smaller than it really is. For example, a proxy may show only the 100 most recent messages in a mailbox, while the mailbox itself has 2000+ messages. The present invention advantageously allows this proxy to select a small subset of the collection that can be presented to the client in lieu of the entire collection without a significant impact to the user experience.
  • More particularly, turning now to FIG. 10, another advantageous embodiment of the protocol interface device 14′″ is now described. Generally speaking, when a data access request is received from a client, the protocol interface device 14′″ accesses one or more of the data systems 24′″, 26′″. However, in some cases accessing the data systems and providing a response to the client might otherwise cause timeouts for certain client protocols, and longer than desired wait times for a user of a client after a request has been sent. Yet, in accordance with the present aspect of the invention, certain data may be stored at the protocol interface device 14′″ which may be used to reduce response times.
  • More particularly, the protocol engine module 32′″ polls the data systems 24′″, 26′″ to determine whether they currently store data items associated with users that have been configured for access thereof. Users are configured in the protocol interface device 14′″ by establishing a user account associated therewith, for example. Polling is preferably performed in accordance with a polling interval. The polling interface may be a static predetermined polling interval, or an adaptive polling interval that can be adjusted based on operating conditions or the occurrence of particular events, as will be appreciated by those skilled in the art.
  • In response to a poll from the protocol engine module 32′″, a given data system 24′″, 26′″ returns data items, or at least data item identifiers that can be used to retrieve the data items, to the protocol interface device 14′″, These data items or identifiers are then stored by the protocol engine module 32′″ in the data store or memory 92′″.
  • In particular, the protocol engine module 32′″ may determine whether new data items for a user are stored in any of the data systems 24′″, 26′″, Where the data systems 24′″, 26′″ are e-mail systems, for example, the protocol engine module 32′″ queries mailboxes associated with each user configured for e-mail access through the protocol interface device 14′″, For each mailbox query, a mail system returns, at a minimum, a list of unique identifiers (UIDs) associated with e-mail messages stored in the mailbox.
  • A current UID list is then compared with a previous UID list for the mailbox in the UID store 92′″ to determine whether new messages have been stored in the mailbox at the mail system. If new messages are detected, an alert is preferably sent to a user's client by the protocol engine module 32′″ in cooperation with the front-end proxy module 30′″ (or another component of the protocol interface device 14′″), and the current UID list including the new messages is stored to the UID store 92′″.
  • One of the most common data access operations is viewing a listing of data items currently stored at data systems, especially where the data items are messages stored on mail systems. As described above, the protocol engine module 32′″ polls one or more of the data systems 24′″, 26′″ to detect new data items based on a list of UIDs stored in the UID store 92′″, Therefore, the protocol interface device 14′″ has a local listing of UIDs of data items that were stored at the data systems 24′″, 26′″ the last time the data systems were polled.
  • In accordance with the present aspect of the invention, the protocol engine module 32′″ retrieves the stored UID list from the UID store 92′″ when a “view items” or similar access request is received. This stored UID list, which is accurate to within the current polling interval, is then returned to the requesting client. This provides a much faster response time than accessing the data systems 24′″, 26′″ when the request is received, as will be appreciated by those skilled in the art.
  • In the case of a POP client, for example, the client times out if no response to a request is received within 30 seconds. Where the POP client is operating on a mobile wireless communications device, latency within the wireless communications network can cause delays that are significant relative to this limited response time. The faster response time associated with providing a stored UID list in response to a data access request is particularly advantageous in these types of scenarios. Even in the absence of such time constraints, a faster response time enhances the user experience at a client by reducing the wait time between sending a data access request and receiving a response.
  • As described above, the stored UID list is accurate to within the polling interval. When the stored UID list is provided to a client in response to a data access request, the protocol engine module 32′″ preferably polls the data system(s) 24′″, 26′″ to determine whether the stored UID list is still accurate. If new items have been stored at the data system(s) 24′″, 26′″ since the last poll, then a new UID list is sent to the client. This further polling of the data systems 24′″, 26′″ is performed either according to the polling interval or initiated by the data access request.
  • It will be appreciated that the preceding description relates to “view items” or similar data access requests. Other types of data access requests may be processed by other components or modules of the protocol interface device 14′″, For example, such data access requests are translated, if necessary, by the front-end proxy module 30′″, as described above.
  • The protocol interface device 14′″ thereby allows access to the data systems 24′″, 26′″, and provides for reduced response times for various types of data access requests. Through the protocol interface device 14′″, a client compatible with any of the protocols handled by the front-end proxy module 30′″ is provided access to one or more of the data systems 24′″, 26′″. The client itself need not support the access protocol or scheme associated with the data system(s) 24′″, 26′″ to be accessed, as noted above.
  • A method of reducing response times for data system access requests using the protocol interface device 14′″ is now described with respect to FIG. 17. Beginning at Block 170, a data access request is received at Block 171. A determination is then made, at Block 172, as to whether data pertinent to the data access request (i.e., a UID list) is locally stored. Where such data is in a local store 92′″, then the stored data is provided to the requesting client, at Block 173. After the stored data has been transmitted to the client, or if no such data has been stored, the data system(s) 24′″, 26′″ to which the data access request relates is polled, at Block 174.
  • An optional step of determining whether the polled data received in response to a poll is different from the stored data may then be performed at Block 175. If so, this means that there is new data stored on the data system(s) 24′″, 26′″, and the data received in response to the poll is provided to the client, at Block 176. It is also locally stored in the data store 92′″, at Block 177, thus concluding the illustrated method (Block 178).
  • By way of example, data access systems and methods according to aspects of the invention may be applied to other types of data storage devices than mail systems, and other protocols and access schemes than those specifically described above and shown in the drawings.
  • Additional features of the invention may be found in co-pending applications entitled COMMUNICATIONS SYSTEM PROVIDING REDUCED ACCESS LATENCY AND RELATED METHODS, attorney docket number ID-494; COMMUNICATIONS SYSTEM INCLUDING PROTOCOL INTERFACE FOR MULTIPLE OPERATING PROTOCOLS AND RELATED METHODS, attorney docket number ID-493; COMMUNICATIONS SYSTEM PROVIDING EXTENSIBLE PROTOCOL TRANSLATION FEATURES AND RELATED METHODS, attorney docket number ID-507; COMMUNICATIONS SYSTEM WITH DATA STORAGE DEVICE INTERFACE PROTOCOL CONNECTORS AND RELATED METHODS, attorney docket number ID-506; COMMUNICATIONS SYSTEM PROVIDING EXTENSIBLE PROTOCOL TRANSLATION AND CONFIGURATION FEATURES AND RELATED METHODS, attorney docket number ID-502; and COMMUNICATIONS SYSTEM INCLUDING PROTOCOL INTERFACE DEVICE PROVIDING ENHANCED OPERATING PROTOCOL SELECTION FEATURES AND RELATED METHODS, attorney docket number ID-495, the entire disclosures of which are hereby incorporated herein by reference.
  • Example
  • An exemplary hand-held mobile wireless communications device 1000 that can be used in the present invention is further described in the example below with reference to FIG. 18. The device 1000 includes a housing 1200, a keyboard 1400 and an output device 1600. The output device shown is a display 1600, which is preferably a full graphic LCD. Other types of output devices may alternatively be utilized. A processing device 1800 is contained within the housing 1200 and is coupled between the keyboard 1400 and the display 1600. The processing device 1800 controls the operation of the display 1600, as well as the overall operation of the mobile device 1000, in response to actuation of keys on the keyboard 1400 by the user.
  • The housing 1200 may be elongated vertically, or may take on other sizes and shapes (including clamshell housing structures). The keyboard may include a mode selection key, or other hardware or software for switching between text entry and telephony entry.
  • In addition to the processing device 1800, other parts of the mobile device 1000 are shown schematically in FIG. 18. These include a communications subsystem 1001; a short-range communications subsystem 1020; the keyboard 1400 and the display 1600, along with other input/ output devices 1060, 1080, 1100 and 1120; as well as memory devices 1160, 1180 and various other device subsystems 1201. The mobile device 1000 is preferably a two-way RF communications device having voice and data communications capabilities. In addition, the mobile device 1000 preferably has the capability to communicate with other computer systems via the Internet.
  • Operating system software executed by the processing device 1800 is preferably stored in a persistent store, such as the flash memory 1160, but may be stored in other types of memory devices, such as a read only memory (ROM) or similar storage element. In addition, system software, specific device applications, or parts thereof, may be temporarily loaded into a volatile store, such as the random access memory (RAM) 1180. Communications signals received by the mobile device may also be stored in the RAM 1180.
  • The processing device 1800, in addition to its operating system functions, enables execution of software applications 1300A-1300N on the device 1000. A predetermined set of applications that control basic device operations, such as data and voice communications 1300A and 1300B, may be installed on the device 1000 during manufacture. In addition, a personal information manager (PIM) application may be installed during manufacture. The PIM is preferably capable of organizing and managing data items, such as e-mail, calendar events, voice mails, appointments, and task items. The PIM application is also preferably capable of sending and receiving data items via a wireless network 1401. Preferably, the PIM data items are seamlessly integrated, synchronized and updated via the wireless network 1401 with the device user's corresponding data items stored or associated with a host computer system.
  • Communication functions, including data and voice communications, are performed through the communications subsystem 1001, and possibly through the short-range communications subsystem. The communications subsystem 1001 includes a receiver 1500, a transmitter 1520, and one or more antennas 1540 and 1560. In addition, the communications subsystem 1001 also includes a processing module, such as a digital signal processor (DSP) 1580, and local oscillators (LOs) 1601. The specific design and implementation of the communications subsystem 1001 is dependent upon the communications network in which the mobile device 1000 is intended to operate. For example, a mobile device 1000 may include a communications subsystem 1001 designed to operate with the Mobitex™, Data TAC™ or General Packet Radio Service (GPRS) mobile data communications networks, and also designed to operate with any of a variety of voice communications networks, such as AMPS, TDMA, CDMA, PCS, GSM, etc. Other types of data and voice networks, both separate and integrated, may also be utilized with the mobile device 1000.
  • Network access requirements vary depending upon the type of communication system. For example, in the Mobitex and DataTAC networks, mobile devices are registered on the network using a unique personal identification number or PIN associated with each device. In GPRS networks, however, network access is associated with a subscriber or user of a device. A GPRS device therefore requires a subscriber identity module, commonly referred to as a SIM card, in order to operate on a GPRS network.
  • When required network registration or activation procedures have been completed, the mobile device 1000 may send and receive communications signals over the communication network 1401. Signals received from the communications network 1401 by the antenna 1540 are routed to the receiver 1500, which provides for signal amplification, frequency down conversion, filtering, channel selection, etc., and may also provide analog to digital conversion. Analog-to-digital conversion of the received signal allows the DSP 1580 to perform more complex communications functions, such as demodulation and decoding. In a similar manner, signals to be transmitted to the network 1401 are processed (e.g. modulated and encoded) by the DSP 1580 and are then provided to the transmitter 1520 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 1401 (or networks) via the antenna 1560.
  • In addition to processing communications signals, the DSP 1580 provides for control of the receiver 1500 and the transmitter 1520. For example, gains applied to communications signals in the receiver 1500 and transmitter 1520 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 1580.
  • In a data communications mode, a received signal, such as a text message or web page download, is processed by the communications subsystem 1001 and is input to the processing device 1800. The received signal is then further processed by the processing device 1800 for an output to the display 1600, or alternatively to some other auxiliary I/O device 1060. A device user may also compose data items, such as e-mail messages, using the keyboard 1400 and/or some other auxiliary I/O device 1060, such as a touchpad, a rocker switch, a thumb-wheel, or some other type of input device. The composed data items may then be transmitted over the communications network 1401 via the communications subsystem 1001.
  • In a voice communications mode, overall operation of the device is substantially similar to the data communications mode, except that received signals are output to a speaker 1100, and signals for transmission are generated by a microphone 1120. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on the device 1000. In addition, the display 1600 may also be utilized in voice communications mode, for example to display the identity of a calling party, the duration of a voice call, or other voice call related information. The short-range communications subsystem enables communication between the mobile device 1000 and other proximate systems or devices, which need not necessarily be similar devices. For example, the short-range communications subsystem may include an infrared device and associated circuits and components, or a Bluetooth™ communications module to provide for communication with similarly-enabled systems and devices.
  • Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood that the invention is not to be limited to the specific embodiments disclosed, and that modifications and embodiments are intended to be included within the scope of the appended claims.
  • Computer Program Listings Program Listing #1—Exemplary Authentication Request
  • PROPFIND /ups HTTP/1.1
    Depth: 0
    Brief: t
    Pragma: no-cache
    Content-Type: text/xml
    X_UP_LOGIN:
    svr=login.oscar.aol.com&prt=5190&ssl=0&pcol=aol&uid=******&pwd=******&pwp=
    X_UP_SYNC: false
    X_UP_REFRESH_CACHE: force
    X_UP_NEWCON: 1
    User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
    Connection: Keep-Alive
    Host: localhost:9080
    Content-Length: 664
    <?xml version=“1.0”?>
    <D:propfind xmlns:D=“DAV:” xmlns:h=“http://schemas.microsoft.com/hotmail/”
    xmlns:hm=“urn:schemas:httpmail:” xmlns:up=“urn:schemas:corp:universalproxy” >
    <D:prop>
    <hm:contacts/>
    <hm:calendar/>
    <hm:journal/>
    <hm:notes/>
    <hm:inbox/>
    <hm:outbox/>
    <hm:sendmsg/>
    <hm:sentitems/>
    <hm:deleteditems/>
    <hm:drafts/>
    <hm:msgfolderroot/>
    <up:corporatecontacts/>
    <h:maxpoll/>
    <h:sig/>
    </D:prop>
    </D:propfind>
    HTTP/1.1 207 Multi-Status
    Set-Cookie: JSESSIONID=C70CD1AED7D2BE210B34D93F7ACD6935; Path=/ups
    Content-Type: text/xml
    Transfer-Encoding: chunked
    Date: Wed, 06 Aug 2003 18:20:28 GMT
    Server: Apache Coyote/1.0
    <?xml version=“1.0” encoding=“UTF-8”?>
    <D:multistatus xmlns:D=“DAV:” xmlns:up=“urn:schemas:corp:universalproxy”
    xmlns:c=“urn:schemas:calendar:” xmlns:a=“urn:schemas:contacts:”
    xmlns:hm=“urn:schemas:httpmail:” xmlns:m=“urn:schemas:mailheader:”>
    <D:response>
    <D:href>http://localhost:9080/ups/</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <hm:inbox>http://localhost:9080/ups/INBOX/</hm:inbox>
    <hm:sendmsg>http://localhost:9080/ups/AOL_MAIL_SUBMISSION_URL/</hm:sendmsg>
    <hm:sentitems>http://localhost:9080/ups/Sent Items/</hm:sentitems>
    <hm:msgfolderroot>http://localhost:9080/ups/</hm:msgfolderroot>
    </D:prop>
    </D:propstat>
    </D:response>
    </D:multistatus>
  • Program Listing #2—Exemplary Inbox Request
  • Query Folder Capabilities:
    REQUEST:
    OPTIONS /ups/INBOX/ HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
    Connection: Keep-Alive
    Host: localhost:9080
    Cookie: JSESSIONID=C70CD1AED7D2BE210B34D93F7ACD6935
    Content-Length: 0
    RESPONSE:
    HTTP/1.1 200 OK
    allow: OPTIONS, PROPFIND, MOVE, DELETE, BDELETE, BMOVE, SEARCH
    dasl: <urn:schemas:corp:universalproxy:basicsearch>
    Content-Type: text/plain
    Content-Length: 0
    Date: Wed, 06 Aug 2003 18:20:28 GMT
    Server: Apache Coyote/1.0
    List messages in INBOX:
    REQUEST:
    PROPFIND /ups/INBOX/ HTTP/1.1
    Range: rows=0-24
    Depth: 1,noroot
    Brief: t
    Pragma: no-cache
    Content-Type: text/xml
    X_UP_REFRESH_CACHE: force
    User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
    Connection: Keep-Alive
    Host: localhost:9080
    Cookie: JSESSIONID=C70CD1AED7D2BE210B34D93F7ACD6935
    Content-Length: 586
    <?xml version=“1.0”?>
    <D:propfind xmlns:D=“DAV:” xmlns:hm=“urn:schemas:httpmail:” xmlns:m=“urn:schemas:mailheader:”
    xmlns:up=“urn:schemas:corp:universalproxy”>
    <D:prop>
    <D:uid/>
    <D:isfolder/>
    <D:ishidden/>
    <hm:read/>
    <hm:hasattachment/>
    <hm:importance/>
    <m:from/>
    <m:subject/>
    <m:date/>
    <up:isdeleted/>
    <D:getcontentlength/>
    <D:contentclass/>
    </D:prop>
    </D:propfind>
    RESPONSE:
    HTTP/1.1 207 Multi-Status
    Content-Range: rows 0-8; total=9
    Content-Type: text/xml
    Transfer-Encoding: chunked
    Date: Wed, 06 Aug 2003 18:20:28 GMT
    Server: Apache Coyote/1.0
    <?xml version=“1.0” encoding=“UTF-8”?>
    <D:multistatus xmlns:D=“DAV:” xmlns:up=“urn:schemas:corp:universalproxy”
    xmlns:c=“urn:schemas:calendar:” xmlns:a=“urn:schemas:contacts:” xmlns:hm=“urn:schemas:httpmail:”
    xmlns:m=“urn:schemas:mailheader:”>
    <D:contentrange>0-8</D:contentrange>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623963;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>3ac59b38c08ad3356435efea144660e3</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>0</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
     <m:from>Mail Delivery Subsystem &lt;MAILER-DAEMON@aol.com></m:from>
    <m:subject>Returned mail: User unknown</m:subject>
    <m:date>2003-08-05T23:12:48Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>3247</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623954;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>51073b22a28c2820115bc80d42e8c6ec</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>1</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>johnsmith@demo.com</m:from>
    <m:subject>Re: Test #1-All -French template</m:subject>
    <m:date>2003-08-05T23:10:30Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>1577</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623926;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>b072c3748ceff1320f9fa746f797e64b</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>1</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>johnsmith@demo.com</m:from>
    <m:subject>Re: xxxFWD: Re: Test #1</m:subject>
    <m:date>2003-08-05T23:07:18Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>1927</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623922;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>11f1c8e69555d33971aea12c09be5021</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>1</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>johnsmith@demo.com</m:from>
    <m:subject>Re: xxxFWD: Re: Test #1</m:subject>
    <m:date>2003-08-05T23:06:45Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>1930</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623915;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>55bc30adfb4fb66f3d11b0416c82b701</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>1</hm:read>
    <hm:hasattachment>1</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>johnsmith@demo.com</m:from>
    <m:subject>xxxFWD: Re: Test #1</m:subject>
    <m:date>2003-08-05T23:05:27Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>3254</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623910;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>07cdf24a06f8e849754f90fe6dc8bf4f</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>1</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>johnsmith@demo.com</m:from>
    <m:subject>Re: Test #1-All</m:subject>
    <m:date>2003-08-05T23:04:31Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>1258</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6623909;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>0e79a3593253ffb9596bf9d86873f498</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>1</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>johnsmith@demo.com</m:from>
    <m:subject>Re: Test #1</m:subject>
    <m:date>2003-08-05T23:04:13Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>1241</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6605332;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>6060b944e60256c814498af29e5f0e47</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>0</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>aolmbrsecurity@aol.com</m:from>
    <m:subject>Security Notice to AOL Members</m:subject>
    <m:date>2003-08-01T23:00:58Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>5137</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/6567082;1</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>f47b72c8c1aa91458f40f81fce3b5e05</D:uid>
    <D:isfolder>0</D:isfolder>
    <D:ishidden>0</D:ishidden>
    <hm:read>0</hm:read>
    <hm:hasattachment>0</hm:hasattachment>
    <hm:importance>1</hm:importance>
    <m:from>aolmemberinfo@aol.com</m:from>
    <m:subject>Coming Soon - AOL 9.0 Optimized</m:subject>
    <m:date>2003-07-25T21:15:22Z</m:date>
    <up:isdeleted>0</up:isdeleted>
    <D:getcontentlength>10012</D:getcontentlength>
    <D:contentclass>urn:content-classes:message</D:contentclass>
    </D:prop>
    </D:propstat>
    </D:response>
    </D:multistatus>
  • Program Listing #3—Exemplary Folder Search Request
  • Capabilities of folder:
    REQUEST:
    OPTIONS /ups HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
    Connection: Keep-Alive
    Host: localhost:9080
    Cookie: JSESSIONID=C70CD1AED7D2BE210B34D93F7ACD6935
    Content-Length: 0
    RESPONSE:
    HTTP/1.1 200 OK
    allow: OPTIONS, PROPFIND, MOVE, DELETE, BDELETE, BMOVE, SEARCH
    dasl: <urn:schemas:corp:universalproxy:basicsearch>
    Content-Type: text/plain
    Content-Length: 0
    Date: Wed, 06 Aug 2003 18:20:28 GMT
    Server: Apache Coyote/1.0
    Search for folders:
    REQUEST:
    SEARCH /ups HTTP/1.1
    Depth: 1,noroot
    Brief: t
    Pragma: no-cache
    Content-Type: text/xml
    User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
    Connection: Keep-Alive
    Host: localhost:9080
    Cookie: JSESSIONID=C70CD1AED7D2BE210B34D93F7ACD6935
    Content-Length: 922
    <?xml version=“1.0”?>
    <D:searchrequest xmlns:D=“DAV:” xmlns:t=“urn:schemas:corp:universalproxy”>
    <t:basicsearch>
    <D:select>
    <D:prop><D:uid/></D:prop>
    <D:prop><D:contentclass/></D:prop>
    <D:prop><D:displayname/></D:prop>
    </D:select>
    <D:from>
    <D:scope>
    <D:href>url</D:href>
    <D:depth>1</D:depth>
    </D:scope>
    </D:from>
    <D:where>
    <D:eq>
    <D:prop><D:contentclass/></D:prop>
    <D:literal>urn:content-classes:mailfolder</D:literal>
    </D:eq>
    </D:where>
    </t:basicsearch>
    </D:searchrequest>
    RESPONSE:
    HTTP/1.1 207 Multi-Status
    Content-Type: text/xml
    Transfer-Encoding: chunked
    Date: Wed, 06 Aug 2003 18:20:28 GMT
    Server: Apache Coyote/1.0
    <?xml version=“1.0” encoding=“UTF-8”?>
    <D:multistatus xmlns:D=“DAV:” xmlns:up=“urn:schemas:corp:universalproxy”
    xmlns:c=“urn:schemas:calendar:” xmlns:a=“urn:schemas:contacts:” xmlns:hm=“urn:schemas:httpmail:”
    xmlns:m=“urn:schemas:mailheader:”>
    <D:response>
    <D:href>http://localhost:9080/ups/INBOX/</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>c90d66b2362a1a0bc3df1852021a6f63</D:uid>
    <D:contentclass>urn:content-classes:mailfolder</D:contentclass>
    <D:displayname>INBOX/</D:displayname>
    </D:prop>
    </D:propstat>
    </D:response>
    <D:response>
    <D:href>http://localhost:9080/ups/VOICE-MAIL/</D:href>
    <D:propstat>
    <D:status>HTTP/1.1 200 OK</D:status>
    <D:prop>
    <D:uid>cabbce34709ab79d2ad2d5334d998272</D:uid>
    <D:contentclass>urn:content-classes:mailfolder</D:contentclass>
    <D:displayname>VOICE-MAIL/</D:displayname>
    </D:prop>
    </D:propstat>
    </D:response>
    </D:multistatus>
  • Program Listing #4—Exemplary Configuration File
  • <resource
    contentclass=“urn:content-classes:mailfolder”
    javaclass=“com.teamon.proxy.data.impl.MailFolderImpl”
    responsecacheduration=“0”
    cachestrength=“0”>
    <request method=“PROPFIND”>
    <header name=“Brief” value=“t” />
    <header name=“Content-Type” value=“text/xml”/>
    <header name=“Depth” value=“1,noroot”/>
    <header name=“Range”  value=“rows=$rangeStart$-$rangeEnd$”/>
    <header name=“Pragma”  value=“no-cache”/>
    <header name=“X_UP_REFRESH_CACHE” value=“force” />
    <body><![CDATA[
    <?xml version=“1.0”?>
    <D:propfind
    xmlns:D=“DAV:”
    xmlns:hm=“urn:schemas:httpmail:”
    xmlns:m=“urn:schemas:mailheader:”
    xmlns:up=“urn:schemas:teamon:universalproxy”>
    <D:prop>
    <D:uid/>
    <D:isfolder/>
    <D:ishidden/>
    <hm:read/>
    <hm:hasattachment/>
    <hm:importance/>
    <m:from/>
    <m:subject/>
    <m:date/>
    <up:isdeleted/>
    <D:getcontentlength/>
    <D:contentclass/>
    </D:prop>
    </D:propfind>
    ]]>
    </body>
    </request>
    </resource>

Claims (22)

1-34. (canceled)
35. A communications system comprising:
a plurality of electronic mail (email) data storage devices, at least some of which being configured to use at least one of a plurality of different operating protocols;
a plurality of mobile wireless communications devices, each using at least one of the plurality of different operating protocols; and
a protocol interface device configured to operate in accordance with a multi-layer protocol model and comprising
a respective proxy module for communicating with said plurality of mobile wireless communications devices using each different operating protocol, and
at least one common core service module coupled to said proxy modules and configured to communicate therewith at a first layer of the multi-layer protocol model, and configurable to implement an interface between said proxy modules and said plurality of mobile wireless communications devices for supporting a new different operating protocol.
36. The communications system of claim 35 wherein the first layer comprises a network layer.
37. The communications system of claim 35 wherein said protocol interface device further comprises at least one configuration file module for storing a first set of configuration files for configuring common core services at the first layer, and for storing a second set of configuration files for configuring common core services at a second layer lower than the first layer.
38. The communications system of claim 35 wherein said plurality of proxy modules convert access requests from said plurality of mobile wireless communications devices to common access parameters supported by said email data storage devices; and wherein said protocol interface device further comprises a flow controller module for receiving the common access parameters from said plurality of proxy modules.
39. The communications system of claim 35 further comprising an extensible mark-up language (XML) engine module coupled to said at least one common core service module.
40. The communications system of claim 39 wherein said XML engine module comprises an extensible stylesheet language transformations (XSLT) engine module.
41. The communications system of claim 39 further comprising a memory coupled to said XML engine module for storing a plurality of templates corresponding to respective operating protocols.
42. A protocol interface device for interfacing a plurality of mobile wireless communications devices with a plurality of electronic mail (email) data storage devices, the mobile wireless communications devices and the email data storage devices using at least one of a plurality of different operating protocols, and the protocol interface device processing data in accordance with a multi-layer protocol model, the protocol interface device comprising:
a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol; and
at least one common core service module coupled to said proxy modules and configured to communicate therewith at a first layer of the multi-layer protocol model, and configurable to implement an interface between said proxy modules and the plurality of mobile wireless communications devices for supporting a new different operating protocol.
43. The protocol interface device of claim 42 wherein the first layer comprises a network layer.
44. The protocol interface device of claim 42 further comprising at least one configuration file module for storing a first set of configuration files for configuring common core services at the first layer, and for storing a second set of configuration files for configuring common core services at a second layer lower than the first layer.
45. The protocol interface device of claim 42 wherein said plurality of proxy modules convert access requests from the plurality of mobile wireless communications devices to common access parameters supported by the email data storage devices; and wherein said protocol interface device further comprises a flow controller module for receiving the common access parameters from said plurality of proxy modules.
46. The protocol interface device of claim 42 further comprising an extensible mark-up language (XML) engine module coupled to said at least one common core service module.
47. The protocol interface device of claim 46 wherein said XML engine module comprises an extensible stylesheet language transformations (XSLT) engine module.
48. The protocol interface device of claim 46 further comprising a memory coupled to said XML engine module for storing a plurality of templates corresponding to respective operating protocols.
49. A method for making an interface for a plurality of mobile wireless communications devices with a plurality of electronic mail (email) data storage devices, the mobile wireless communications devices and the email data storage devices using at least one of a plurality of different operating protocols, and the protocol interface device processing data in accordance with a multi-layer protocol model, the method comprising:
providing a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol; and
providing at least one common core service module coupled to the proxy modules and configured to communicate therewith at a first layer of the multi-layer protocol model, and configurable to implement an interface between the proxy modules and the plurality of mobile wireless communications devices for supporting a new different operating protocol.
50. The method of claim 49 wherein the first layer comprises a network layer.
51. The method of claim 49 further comprising providing at least one configuration file module for storing a first set of configuration files for configuring common core services at the first layer, and for storing a second set of configuration files for configuring common core services at a second layer lower than the first layer.
52. The method of claim 49 wherein the plurality of proxy modules convert access requests from the plurality of mobile wireless communications devices to common access parameters supported by the email data storage devices; and further comprising providing a flow controller module for receiving the common access parameters from the plurality of proxy modules.
53. The method of claim 49 further comprising providing an extensible mark-up language (XML) engine module coupled to the at least one common core service module.
54. The method of claim 53 wherein the XML engine module comprises an extensible stylesheet language transformations (XSLT) engine module.
55. The method of claim 53 further comprising a memory coupled to the XML engine module for storing a plurality of templates corresponding to respective operating protocols.
US12/843,915 2003-08-11 2010-07-27 Communications system providing multi-layered extensible protocol interface and related methods Abandoned US20100293259A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/843,915 US20100293259A1 (en) 2003-08-11 2010-07-27 Communications system providing multi-layered extensible protocol interface and related methods

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US49423403P 2003-08-11 2003-08-11
US49425503P 2003-08-11 2003-08-11
US10/778,709 US7774486B2 (en) 2003-08-11 2004-02-12 Communications system providing multi-layered extensible protocol interface and related methods
US12/843,915 US20100293259A1 (en) 2003-08-11 2010-07-27 Communications system providing multi-layered extensible protocol interface and related methods

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/778,709 Continuation US7774486B2 (en) 2003-08-11 2004-02-12 Communications system providing multi-layered extensible protocol interface and related methods

Publications (1)

Publication Number Publication Date
US20100293259A1 true US20100293259A1 (en) 2010-11-18

Family

ID=34139623

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/778,709 Expired - Lifetime US7774486B2 (en) 2003-08-11 2004-02-12 Communications system providing multi-layered extensible protocol interface and related methods
US12/843,915 Abandoned US20100293259A1 (en) 2003-08-11 2010-07-27 Communications system providing multi-layered extensible protocol interface and related methods

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/778,709 Expired - Lifetime US7774486B2 (en) 2003-08-11 2004-02-12 Communications system providing multi-layered extensible protocol interface and related methods

Country Status (4)

Country Link
US (2) US7774486B2 (en)
EP (1) EP1661012A4 (en)
CA (1) CA2533106C (en)
WO (1) WO2005020039A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586058A (en) * 2020-05-09 2020-08-25 成都安恒信息技术有限公司 Mixed protocol agent system and method for operation and maintenance audit system
US11477796B2 (en) * 2019-02-13 2022-10-18 Apple Inc. Radio resource management for network assisted new radio V2X sidelink resource allocation
US11825501B2 (en) 2019-02-13 2023-11-21 Apple Inc. Radio resource management for network assisted new radio V2X sidelink resource allocation

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7685302B2 (en) * 2003-08-11 2010-03-23 Teamon Systems, Inc. Communications system providing extensible protocol translation and configuration features and related methods
US20050078704A1 (en) * 2003-10-14 2005-04-14 International Business Machines Corporation Method and apparatus for translating data packets from one network protocol to another
EP1866780A4 (en) * 2005-03-30 2013-07-31 Welch Allyn Inc Communication of information between a plurality of network elements
US7929410B2 (en) 2005-06-29 2011-04-19 Interdigital Technology Corporation Protocol engine for processing data in a wireless transmit/receive unit
EP2092420B1 (en) 2006-10-18 2018-08-01 Google LLC Generic online ranking system and method suitable for syndication
US8307016B2 (en) * 2008-02-25 2012-11-06 Microsoft Corporation Accessing different application data via a common data structure
EP2385656B1 (en) * 2010-05-06 2012-12-12 Deutsche Telekom AG Method and system for controlling data communication within a network
US8726367B2 (en) 2011-03-30 2014-05-13 Elwha Llc Highlighting in response to determining device transfer
US8745725B2 (en) 2011-03-30 2014-06-03 Elwha Llc Highlighting in response to determining device transfer
US8739275B2 (en) 2011-03-30 2014-05-27 Elwha Llc Marking one or more items in response to determining device transfer
US8863275B2 (en) 2011-03-30 2014-10-14 Elwha Llc Access restriction in response to determining device transfer
US8713670B2 (en) * 2011-03-30 2014-04-29 Elwha Llc Ascertaining presentation format based on device primary control determination
US9153194B2 (en) 2011-03-30 2015-10-06 Elwha Llc Presentation format selection based at least on device transfer determination
US8918861B2 (en) 2011-03-30 2014-12-23 Elwha Llc Marking one or more items in response to determining device transfer
US8839411B2 (en) 2011-03-30 2014-09-16 Elwha Llc Providing particular level of access to one or more items in response to determining primary control of a computing device
US8726366B2 (en) * 2011-03-30 2014-05-13 Elwha Llc Ascertaining presentation format based on device primary control determination
US9317111B2 (en) 2011-03-30 2016-04-19 Elwha, Llc Providing greater access to one or more items in response to verifying device transfer
CN102624685B (en) * 2011-11-24 2015-05-20 高新兴科技集团股份有限公司 Encodable protocol processing method for intelligent equipment
JP6020278B2 (en) * 2013-03-21 2016-11-02 富士通株式会社 Autonomous distributed cache allocation control system
CN103347037A (en) * 2013-05-29 2013-10-09 成都瑞科电气有限公司 WCF realization-based communication front-end processor system and communicating method
CN105049225B (en) * 2015-06-05 2018-06-26 江苏国电南自海吉科技有限公司 A kind of electric system front-end processor system based on dynamic character weight
US10271196B1 (en) * 2018-08-02 2019-04-23 Capital One Services, Llc Activating an emergency mode associated with a user device
CN111488308B (en) * 2020-04-17 2022-11-18 苏州浪潮智能科技有限公司 System and method for supporting multi-processor expansion of different architectures

Citations (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802292A (en) * 1995-04-28 1998-09-01 Digital Equipment Corporation Method for predictive prefetching of information over a communications network
US5995503A (en) * 1996-06-12 1999-11-30 Bay Networks, Inc. Method and apparatus for providing quality of service routing in a network
US6070191A (en) * 1997-10-17 2000-05-30 Lucent Technologies Inc. Data distribution techniques for load-balanced fault-tolerant web access
US6195686B1 (en) * 1997-09-29 2001-02-27 Ericsson Inc. Messaging application having a plurality of interfacing capabilities
US6230193B1 (en) * 1996-10-31 2001-05-08 3Com Corporation Method and apparatus supporting network communications
US6289212B1 (en) * 1998-09-16 2001-09-11 Openwave Systems Inc. Method and apparatus for providing electronic mail services during network unavailability
US6311165B1 (en) * 1998-04-29 2001-10-30 Ncr Corporation Transaction processing systems
US20010042100A1 (en) * 2000-04-14 2001-11-15 David Guedalia Unified system and methodology for remote access to e-mail
US20010043577A1 (en) * 2000-02-22 2001-11-22 Peter Barany System and method for controlling a wireless packet switched voice call
US20010056504A1 (en) * 1999-12-21 2001-12-27 Eugene Kuznetsov Method and apparatus of data exchange using runtime code generator and translator
US20020016818A1 (en) * 2000-05-11 2002-02-07 Shekhar Kirani System and methodology for optimizing delivery of email attachments for disparate devices
US20020019812A1 (en) * 2000-06-16 2002-02-14 Board Karen Eleanor System and service for receiving, customizing, and re-broadcasting high-speed financial data to users operating wireless network-capable devices
US6356529B1 (en) * 1999-08-12 2002-03-12 Converse, Ltd. System and method for rapid wireless application protocol translation
US20020035605A1 (en) * 2000-01-26 2002-03-21 Mcdowell Mark Use of presence and location information concerning wireless subscribers for instant messaging and mobile commerce
US20020058480A1 (en) * 2000-11-13 2002-05-16 Matsushita Electri Industrial Co., Ltd. Base station apparatus, mobile terminal apparatus and wireless access system using the apparatuses
US20020087628A1 (en) * 2000-12-29 2002-07-04 Andrew Rouse System and method for providing wireless device access to e-mail applications
US6421732B1 (en) * 1998-08-27 2002-07-16 Ip Dynamics, Inc. Ipnet gateway
US6425057B1 (en) * 1998-08-27 2002-07-23 Hewlett-Packard Company Caching protocol method and system based on request frequency and relative storage duration
US20020112007A1 (en) * 1999-11-03 2002-08-15 Christopher (Noah) Wood Personal message management system
US6446114B1 (en) * 1998-07-13 2002-09-03 At&T Corp. Messaging agent and method for retrieving and consolidating messages
US6463427B1 (en) * 1999-03-16 2002-10-08 Microsoft Corporation Use of object signature property as a search parameter during synchronization of objects on a computer
US20020157023A1 (en) * 2001-03-29 2002-10-24 Callahan John R. Layering enterprise application services using semantic firewalls
US20020174194A1 (en) * 2001-05-18 2002-11-21 Eoin Mooney Providing access to a plurality of message accounts from a single web-based interface
US20020187777A1 (en) * 1999-10-15 2002-12-12 Osterhout Gregory T. Portable call management system
US20030004955A1 (en) * 2001-06-27 2003-01-02 Microsoft Corporation System and method for translating synchronization information between two networks based on different synchronization protocols
US20030018721A1 (en) * 2001-06-29 2003-01-23 Virad Gupta Unified messaging with separate media component storage
US20030046366A1 (en) * 2001-02-13 2003-03-06 Shishir Pardikar System and method for providing transparent access to distributed authoring and versioning files including encrypted files
US6549937B1 (en) * 1999-07-21 2003-04-15 Microsoft Corporation System and method for multi-protocol communication in a computer network
US6557026B1 (en) * 1999-09-29 2003-04-29 Morphism, L.L.C. System and apparatus for dynamically generating audible notices from an information network
US6560222B1 (en) * 1998-04-03 2003-05-06 Vertical Networks, Inc. Systems and methods for multiple voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same
US20030093565A1 (en) * 2001-07-03 2003-05-15 Berger Adam L. System and method for converting an attachment in an e-mail for delivery to a device of limited rendering capability
US20030097410A1 (en) * 2001-10-04 2003-05-22 Atkins R. Travis Methodology for enabling multi-party collaboration across a data network
US6578069B1 (en) * 1999-10-04 2003-06-10 Microsoft Corporation Method, data structure, and computer program product for identifying a network resource
US6597683B1 (en) * 1999-09-10 2003-07-22 Pulse-Link, Inc. Medium access control protocol for centralized wireless network communication management
US20030145132A1 (en) * 2002-01-30 2003-07-31 Arvind Srinivasan Cell software and process for installing it
US20030145306A1 (en) * 2002-01-29 2003-07-31 Melahn Gregory T. Remote electronic file builder
US6615212B1 (en) * 1999-08-19 2003-09-02 International Business Machines Corporation Dynamically provided content processor for transcoded data types at intermediate stages of transcoding process
US20030191799A1 (en) * 2000-03-14 2003-10-09 Netilla Networks, Inc. Apparatus and accompanying methods for providing, through a centralized server site, a secure, cost-effective, web-enabled, integrated virtual office environment remotely accessible through a network-connected web browser
US20030231207A1 (en) * 2002-03-25 2003-12-18 Baohua Huang Personal e-mail system and method
US20040044961A1 (en) * 2002-08-28 2004-03-04 Leonid Pesenson Method and system for transformation of an extensible markup language document
US20040049737A1 (en) * 2000-04-26 2004-03-11 Novarra, Inc. System and method for displaying information content with selective horizontal scrolling
US20040162918A1 (en) * 2003-02-17 2004-08-19 Richard Freidman System and method for invoking WebDAV methods via non-WebDAV communication protocols
US6785255B2 (en) * 2001-03-13 2004-08-31 Bharat Sastri Architecture and protocol for a wireless communication network to provide scalable web services to mobile access devices
US20040177271A1 (en) * 2003-02-25 2004-09-09 Susquehanna International Group, Llp Electronic message filter
US6801603B1 (en) * 1999-12-28 2004-10-05 Comverse Ltd. Online aggregation
US20050033958A1 (en) * 2003-08-07 2005-02-10 Connell John M. Method and system for secure transfer of electronic information
US6947943B2 (en) * 2001-10-26 2005-09-20 Zeosoft Technology Group, Inc. System for development, management and operation of distributed clients and servers
US7117504B2 (en) * 2001-07-10 2006-10-03 Microsoft Corporation Application program interface that enables communication for a network software platform
US7146403B2 (en) * 2001-11-02 2006-12-05 Juniper Networks, Inc. Dual authentication of a requestor using a mail server and an authentication server
US7240095B1 (en) * 2002-02-22 2007-07-03 Bellsouth Intellectual Property Corporation Electronic mail notification
US7454195B2 (en) * 2001-11-16 2008-11-18 At&T Mobility Ii, Llc System for the centralized storage of wireless customer information
US7499889B2 (en) * 2000-10-23 2009-03-03 Cyota Inc. Transaction system
US7627659B2 (en) * 2002-04-19 2009-12-01 Telefonaktiebolaget L M Ericsson (Publ) Method and devices for adaptive proxying of flows
US7644170B2 (en) * 2003-08-11 2010-01-05 Teamon Systems, Inc. Communications system providing extensible protocol translation features and related methods
US7685302B2 (en) * 2003-08-11 2010-03-23 Teamon Systems, Inc. Communications system providing extensible protocol translation and configuration features and related methods

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001256902A1 (en) 2000-05-05 2001-11-20 James Ewing A method and a system relating to protocol communications within a pre-existing www server framework
AUPQ883200A0 (en) 2000-07-18 2000-08-10 Telefonaktiebolaget Lm Ericsson (Publ) Telecommunication system and method of communicating protocol information

Patent Citations (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802292A (en) * 1995-04-28 1998-09-01 Digital Equipment Corporation Method for predictive prefetching of information over a communications network
US5995503A (en) * 1996-06-12 1999-11-30 Bay Networks, Inc. Method and apparatus for providing quality of service routing in a network
US6230193B1 (en) * 1996-10-31 2001-05-08 3Com Corporation Method and apparatus supporting network communications
US6195686B1 (en) * 1997-09-29 2001-02-27 Ericsson Inc. Messaging application having a plurality of interfacing capabilities
US6070191A (en) * 1997-10-17 2000-05-30 Lucent Technologies Inc. Data distribution techniques for load-balanced fault-tolerant web access
US6560222B1 (en) * 1998-04-03 2003-05-06 Vertical Networks, Inc. Systems and methods for multiple voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6311165B1 (en) * 1998-04-29 2001-10-30 Ncr Corporation Transaction processing systems
US6446114B1 (en) * 1998-07-13 2002-09-03 At&T Corp. Messaging agent and method for retrieving and consolidating messages
US6421732B1 (en) * 1998-08-27 2002-07-16 Ip Dynamics, Inc. Ipnet gateway
US6425057B1 (en) * 1998-08-27 2002-07-23 Hewlett-Packard Company Caching protocol method and system based on request frequency and relative storage duration
US6289212B1 (en) * 1998-09-16 2001-09-11 Openwave Systems Inc. Method and apparatus for providing electronic mail services during network unavailability
US6463427B1 (en) * 1999-03-16 2002-10-08 Microsoft Corporation Use of object signature property as a search parameter during synchronization of objects on a computer
US6549937B1 (en) * 1999-07-21 2003-04-15 Microsoft Corporation System and method for multi-protocol communication in a computer network
US6356529B1 (en) * 1999-08-12 2002-03-12 Converse, Ltd. System and method for rapid wireless application protocol translation
US6615212B1 (en) * 1999-08-19 2003-09-02 International Business Machines Corporation Dynamically provided content processor for transcoded data types at intermediate stages of transcoding process
US6597683B1 (en) * 1999-09-10 2003-07-22 Pulse-Link, Inc. Medium access control protocol for centralized wireless network communication management
US6557026B1 (en) * 1999-09-29 2003-04-29 Morphism, L.L.C. System and apparatus for dynamically generating audible notices from an information network
US6578069B1 (en) * 1999-10-04 2003-06-10 Microsoft Corporation Method, data structure, and computer program product for identifying a network resource
US20020187777A1 (en) * 1999-10-15 2002-12-12 Osterhout Gregory T. Portable call management system
US20020112007A1 (en) * 1999-11-03 2002-08-15 Christopher (Noah) Wood Personal message management system
US20010056504A1 (en) * 1999-12-21 2001-12-27 Eugene Kuznetsov Method and apparatus of data exchange using runtime code generator and translator
US6801603B1 (en) * 1999-12-28 2004-10-05 Comverse Ltd. Online aggregation
US20020035605A1 (en) * 2000-01-26 2002-03-21 Mcdowell Mark Use of presence and location information concerning wireless subscribers for instant messaging and mobile commerce
US20010043577A1 (en) * 2000-02-22 2001-11-22 Peter Barany System and method for controlling a wireless packet switched voice call
US20030191799A1 (en) * 2000-03-14 2003-10-09 Netilla Networks, Inc. Apparatus and accompanying methods for providing, through a centralized server site, a secure, cost-effective, web-enabled, integrated virtual office environment remotely accessible through a network-connected web browser
US20010042100A1 (en) * 2000-04-14 2001-11-15 David Guedalia Unified system and methodology for remote access to e-mail
US20040049737A1 (en) * 2000-04-26 2004-03-11 Novarra, Inc. System and method for displaying information content with selective horizontal scrolling
US20020016818A1 (en) * 2000-05-11 2002-02-07 Shekhar Kirani System and methodology for optimizing delivery of email attachments for disparate devices
US20020019812A1 (en) * 2000-06-16 2002-02-14 Board Karen Eleanor System and service for receiving, customizing, and re-broadcasting high-speed financial data to users operating wireless network-capable devices
US7499889B2 (en) * 2000-10-23 2009-03-03 Cyota Inc. Transaction system
US20020058480A1 (en) * 2000-11-13 2002-05-16 Matsushita Electri Industrial Co., Ltd. Base station apparatus, mobile terminal apparatus and wireless access system using the apparatuses
US20020087628A1 (en) * 2000-12-29 2002-07-04 Andrew Rouse System and method for providing wireless device access to e-mail applications
US20030046366A1 (en) * 2001-02-13 2003-03-06 Shishir Pardikar System and method for providing transparent access to distributed authoring and versioning files including encrypted files
US6785255B2 (en) * 2001-03-13 2004-08-31 Bharat Sastri Architecture and protocol for a wireless communication network to provide scalable web services to mobile access devices
US20020157023A1 (en) * 2001-03-29 2002-10-24 Callahan John R. Layering enterprise application services using semantic firewalls
US20020174194A1 (en) * 2001-05-18 2002-11-21 Eoin Mooney Providing access to a plurality of message accounts from a single web-based interface
US20030004955A1 (en) * 2001-06-27 2003-01-02 Microsoft Corporation System and method for translating synchronization information between two networks based on different synchronization protocols
US20030018721A1 (en) * 2001-06-29 2003-01-23 Virad Gupta Unified messaging with separate media component storage
US20030093565A1 (en) * 2001-07-03 2003-05-15 Berger Adam L. System and method for converting an attachment in an e-mail for delivery to a device of limited rendering capability
US7117504B2 (en) * 2001-07-10 2006-10-03 Microsoft Corporation Application program interface that enables communication for a network software platform
US20030097410A1 (en) * 2001-10-04 2003-05-22 Atkins R. Travis Methodology for enabling multi-party collaboration across a data network
US6947943B2 (en) * 2001-10-26 2005-09-20 Zeosoft Technology Group, Inc. System for development, management and operation of distributed clients and servers
US7146403B2 (en) * 2001-11-02 2006-12-05 Juniper Networks, Inc. Dual authentication of a requestor using a mail server and an authentication server
US7454195B2 (en) * 2001-11-16 2008-11-18 At&T Mobility Ii, Llc System for the centralized storage of wireless customer information
US20030145306A1 (en) * 2002-01-29 2003-07-31 Melahn Gregory T. Remote electronic file builder
US20030145132A1 (en) * 2002-01-30 2003-07-31 Arvind Srinivasan Cell software and process for installing it
US7240095B1 (en) * 2002-02-22 2007-07-03 Bellsouth Intellectual Property Corporation Electronic mail notification
US20030231207A1 (en) * 2002-03-25 2003-12-18 Baohua Huang Personal e-mail system and method
US7627659B2 (en) * 2002-04-19 2009-12-01 Telefonaktiebolaget L M Ericsson (Publ) Method and devices for adaptive proxying of flows
US20040044961A1 (en) * 2002-08-28 2004-03-04 Leonid Pesenson Method and system for transformation of an extensible markup language document
US20040162918A1 (en) * 2003-02-17 2004-08-19 Richard Freidman System and method for invoking WebDAV methods via non-WebDAV communication protocols
US20040177271A1 (en) * 2003-02-25 2004-09-09 Susquehanna International Group, Llp Electronic message filter
US20050033958A1 (en) * 2003-08-07 2005-02-10 Connell John M. Method and system for secure transfer of electronic information
US7644170B2 (en) * 2003-08-11 2010-01-05 Teamon Systems, Inc. Communications system providing extensible protocol translation features and related methods
US7685302B2 (en) * 2003-08-11 2010-03-23 Teamon Systems, Inc. Communications system providing extensible protocol translation and configuration features and related methods

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11477796B2 (en) * 2019-02-13 2022-10-18 Apple Inc. Radio resource management for network assisted new radio V2X sidelink resource allocation
US11825501B2 (en) 2019-02-13 2023-11-21 Apple Inc. Radio resource management for network assisted new radio V2X sidelink resource allocation
CN111586058A (en) * 2020-05-09 2020-08-25 成都安恒信息技术有限公司 Mixed protocol agent system and method for operation and maintenance audit system

Also Published As

Publication number Publication date
CA2533106C (en) 2010-06-22
WO2005020039A2 (en) 2005-03-03
EP1661012A4 (en) 2007-08-01
US20050036513A1 (en) 2005-02-17
WO2005020039A3 (en) 2005-08-04
EP1661012A2 (en) 2006-05-31
CA2533106A1 (en) 2005-03-03
US7774486B2 (en) 2010-08-10

Similar Documents

Publication Publication Date Title
US8463864B2 (en) Communications system including protocol interface device providing enhanced operating protocol selection features and related methods
US8135759B2 (en) Communications system including protocol interface device for use with multiple operating protocols and related methods
US8205002B2 (en) Communications system providing extensible protocol translation features and related methods
US7289975B2 (en) Communications system with data storage device interface protocol connectors and related methods
US20100293259A1 (en) Communications system providing multi-layered extensible protocol interface and related methods
US20100153493A1 (en) Communications system providing extensible protocol translation and configuration features and related methods
US20120030296A1 (en) Communications system providing reduced access latency and related methods

Legal Events

Date Code Title Description
AS Assignment

Owner name: TEAMON SYSTEMS, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLARKE, DAVID JAMES;REEL/FRAME:024744/0225

Effective date: 20040210

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE

AS Assignment

Owner name: BLACKBERRY LIMITED, ONTARIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TEAMON SYSTEMS, INC.;REEL/FRAME:033254/0712

Effective date: 20140206

AS Assignment

Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103

Effective date: 20230511